Search results for "Computer Science::Multimedia"

showing 10 items of 35 documents

A-Codes from Rational Functions over Galois Rings

2006

In this paper, we describe authentication codes via (generalized) Gray images of suitable codes over Galois rings. Exponential sums over these rings help determine--or bound--the parameters of such codes.

Discrete mathematicsMathematics::Commutative AlgebraApplied MathematicsFundamental theorem of Galois theoryGalois groupRational functionExponential polynomialComputer Science ApplicationsEmbedding problemDifferential Galois theorysymbols.namesakeGalois rings Gray map codesComputer Science::Computer Vision and Pattern RecognitionComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONComputer Science::MultimediasymbolsSettore MAT/03 - GeometriaGalois extensionResolventMathematicsDesigns, Codes and Cryptography
researchProduct

The effect of wavelet and discrete cosine transform compression of digital radiographs on the detection of subtle proximal caries. ROC analysis.

2007

The study compared diagnostic performances of 2 different image compression methods: JPEG (discrete cosine transform; Joint Photographic Experts Group compression standard) versus JPEG2000 (discrete wavelet transform), both at a compression ratio of 12:1, from the original uncompressed TIFF radiograph with respect to the detection of non-cavitated carious lesions. Therefore, 100 approximal surfaces of 50 tooth pairs were evaluated on the radiographs by 10 experienced observers using a 5-point confidence scale. Observations were carried out on a standardized viewing monitor under subdued light conditions. The proportion of diseased surfaces was balanced to approximately 50% to avoid bias. Tr…

Discrete wavelet transformDental CariesSensitivity and SpecificityDiagnosis DifferentialWaveletComputer Science::MultimediaDiscrete cosine transformHumansDental EnamelGeneral DentistryLossless JPEGTransform codingMathematicsObserver VariationMicroscopybusiness.industryPattern recognitioncomputer.file_formatMicrotomyRadiography Dental DigitalData CompressionJPEGROC CurveJPEG 2000DentinArtificial intelligencebusinesscomputerAlgorithmsImage compressionCaries research
researchProduct

RootsGLOH2: embedding RootSIFT 'square rooting' in sGLOH2

2020

This study introduces an extension of the shifting gradient local orientation histogram doubled (sGLOH2) local image descriptor inspired by RootSIFT ‘square rooting’ as a way to indirectly alter the matching distance used to compare the descriptor vectors. The extended descriptor, named RootsGLOH2, achieved the best results in terms of matching accuracy and robustness among the latest state-of-the-art non-deep descriptors in recent evaluation contests dealing with both planar and non-planar scenes. RootsGLOH2 also achieves a matching accuracy very close to that obtained by the best deep descriptors to date. Beside confirming that ‘square rooting’ has beneficial effects on sGLOH2 as it happe…

FEATURE EXTRACTIONLOCAL FEATUREComputer scienceFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-invariant feature transformFEATURE MATCHING02 engineering and technologyRobustness (computer science)Euclidean geometryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringBeneficial effectsSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - Informaticabusiness.industryImage matching020206 networking & telecommunicationsPattern recognitionCOMPUTER VISIONImage Matching Local Image Descriptors RootSIFT sGLOH2Computer Science::Computer Vision and Pattern RecognitionEmbedding020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftwareSquare rootingIMAGE MATCHING
researchProduct

A robust blind 3-D mesh watermarking based on wavelet transform for copyright protection

2019

Nowadays, three-dimensional meshes have been extensively used in several applications such as, industrial, medical, computer-aided design (CAD) and entertainment due to the processing capability improvement of computers and the development of the network infrastructure. Unfortunately, like digital images and videos, 3-D meshes can be easily modified, duplicated and redistributed by unauthorized users. Digital watermarking came up while trying to solve this problem. In this paper, we propose a blind robust watermarking scheme for three-dimensional semiregular meshes for Copyright protection. The watermark is embedded by modifying the norm of the wavelet coefficient vectors associated with th…

FOS: Computer and information sciences0209 industrial biotechnologyComputer sciencevideo watermarking02 engineering and technologyWatermarkingimage watermarking020901 industrial engineering & automationWaveletcopy protectionvectorsRobustness (computer science)Computer Science::Multimedia0202 electrical engineering electronic engineering information engineeringwavelet coefficient vectorsControlled IndexingComputer visionPolygon meshQuantization (image processing)RobustnessDigital watermarkingComputingMilieux_MISCELLANEOUSComputer Science::Cryptography and SecurityQuantization (signal)digital watermarkingbusiness.industrycopyrightedge normal normsWavelet transformunauthorized usersWatermarkThree-dimensional meshesMultimedia (cs.MM)mesh generationwavelet transformssynchronizing primitives3D semiregular meshesSolid modelingrobust blind 3D mesh watermarking020201 artificial intelligence & image processingArtificial intelligenceLaplacian smoothingbusinessCopyright protection[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingComputer Science - Multimediaimage resolutionDigital images
researchProduct

Keypoint descriptor matching with context-based orientation estimation

2014

Abstract This paper presents a matching strategy to improve the discriminative power of histogram-based keypoint descriptors by constraining the range of allowable dominant orientations according to the context of the scene under observation. This can be done when the descriptor uses a circular grid and quantized orientation steps, by computing or providing a global reference orientation based on the feature matches. The proposed matching strategy is compared with the standard approaches used with the SIFT and GLOH descriptors and the recent rotation invariant MROGH and LIOP descriptors. A new evaluation protocol based on an approximated overlap error is presented to provide an effective an…

GLOHComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-invariant feature transformContext basedReference orientationImage descriptorLIOPDiscriminative modelMROGHHistogramKeypoint matchingSIFTComputer Science::MultimediaComputer visionInvariant (mathematics)MathematicsDominant orientationSettore INF/01 - Informaticabusiness.industryPattern recognitionGridLocal featureRotation invarianceComputer Science::Computer Vision and Pattern RecognitionSignal ProcessingImage descriptors; Local features; Dominant orientation; Rotation invariance; Keypoint matching; SIFT; LIOP; MROGHComputer Vision and Pattern RecognitionArtificial intelligencebusiness
researchProduct

Robust Light Field Watermarking by 4D Wavelet Transform

2020

Unlike common 2D images, the light field representation of a scene delivers spatial and angular description which is of paramount importance for 3D reconstruction. Despite the numerous methods proposed for 2D image watermarking, such methods do not address the angular information of the light field. Hence the exploitation of such methods may cause severe destruction of the angular information. In this paper, we propose a novel method for light field watermarking with extensive consideration of the spatial and angular information. Considering the 4D innate of the light field, the proposed method incorporates 4D wavelet for the purpose of watermarking and converts the heavily-correlated chann…

General Computer ScienceComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION4D waveletImage processing02 engineering and technologyGaussian noisesymbols.namesakeWaveletRobustness (computer science)Computer Science::Multimedia0202 electrical engineering electronic engineering information engineeringDiscrete cosine transformMedian filterlight fieldplenoptic imageGeneral Materials ScienceComputer visionDigital watermarkingbusiness.industry3D reconstructionGeneral EngineeringWavelet transformDCT020207 software engineeringcomputer.file_formatÒpticaGaussian noiseJPEG 2000symbolsRGB color model020201 artificial intelligence & image processingArtificial intelligenceDigital watermarkinglcsh:Electrical engineering. Electronics. Nuclear engineeringbusinesscomputerlcsh:TK1-9971Light fieldImatges Processament Tècniques digitalsIEEE Access
researchProduct

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks

2009

In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collector’s retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve all the desires, we propose a scheme - H2S by making use of both homomorphic secret sharing and homomorphic encryption. The security and efficiency of our scheme are justified by extensive analysis.

Homomorphic secret sharingComputer sciencebusiness.industryClient-side encryptionEncryptioncomputer.software_genreMultiple encryptionProbabilistic encryptionComputer Science::MultimediaComputer Science::Networking and Internet Architecture40-bit encryptionAttribute-based encryptionOn-the-fly encryptionbusinesscomputerComputer Science::Cryptography and SecurityComputer network2009 Fifth International Conference on Information Assurance and Security
researchProduct

Comparison of perceptually uniform quantisation with average error minimisation in image transform coding

1999

An alternative transform coder design criterion based on restricting the maximum perceptual error of each coefficient is proposed. This perceptually uniform quantisation of the transform domain ensures that the perceptual error will be below a certain limit regardless of the particular input image. The results show that the proposed criterion improves the subjective quality of the conventional average error criterion even if it is weighted with the same perceptual metric.

Minimisation (psychology)Image codingbusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPattern recognitionDomain (mathematical analysis)Image (mathematics)Computer Science::GraphicsComputer Science::SoundComputer Science::MultimediaMetric (mathematics)Limit (mathematics)Artificial intelligenceElectrical and Electronic EngineeringSubjective qualitybusinessTransform codingMathematicsElectronics Letters
researchProduct

A Note about Eigenvalues, SVD and PCA

2013

Notes on eigen-decomposition, PCA, SVD and connexions.

PCA[INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Computer Science::Computer Vision and Pattern RecognitionComputer Science::MultimediaQuantitative Biology::Populations and Evolution[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]SVDComputer Science::Numerical Analysis
researchProduct

Comments on “Four-Stream Spherical Harmonic Expansion Approximation for Solar Radiative Transfer”

1998

Comments on : four-stream spherical harmonic expansion approximation for solar radiative transfer.

PhysicsAtmospheric ScienceClassical mechanicsDifferential equationQuantum electrodynamicsComputer Science::MultimediaPhysics::Space PhysicsRadiative transferAstrophysics::Solar and Stellar AstrophysicsSpherical harmonicsAstrophysics::Earth and Planetary AstrophysicsJournal of the Atmospheric Sciences
researchProduct