• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 10,204
Next 10 →

VisualSEEk: a fully automated content-based image query system

by John R. Smith, Shih-fu Chang , 1996
"... We describe a highly functional prototype system for searching by visual features in an image database. The VisualSEEk system is novel in that the user forms the queries by diagramming spatial arrangements of color regions. The system finds the images that contain the most similar arrangements of ..."
Abstract - Cited by 762 (31 self) - Add to MetaCart
We describe a highly functional prototype system for searching by visual features in an image database. The VisualSEEk system is novel in that the user forms the queries by diagramming spatial arrangements of color regions. The system finds the images that contain the most similar arrangements

Visual categorization with bags of keypoints

by Gabriella Csurka, Christopher R. Dance, Lixin Fan, Jutta Willamowski, Cédric Bray - In Workshop on Statistical Learning in Computer Vision, ECCV , 2004
"... Abstract. We present a novel method for generic visual categorization: the problem of identifying the object content of natural images while generalizing across variations inherent to the object class. This bag of keypoints method is based on vector quantization of affine invariant descriptors of im ..."
Abstract - Cited by 1005 (14 self) - Add to MetaCart
Abstract. We present a novel method for generic visual categorization: the problem of identifying the object content of natural images while generalizing across variations inherent to the object class. This bag of keypoints method is based on vector quantization of affine invariant descriptors

Labeling Images with a Computer Game

by Luis Von Ahn , 2004
"... We introduce a new interactive system: a game that is fun and can be used to create valuable output. When people play the game they help determine the contents of images by providing meaningful labels for them. If the game is played as much as popular online games, we estimate that most images on ..."
Abstract - Cited by 773 (11 self) - Add to MetaCart
We introduce a new interactive system: a game that is fun and can be used to create valuable output. When people play the game they help determine the contents of images by providing meaningful labels for them. If the game is played as much as popular online games, we estimate that most images

A survey on visual surveillance of object motion and behaviors

by Weiming Hu, Tieniu Tan, Liang Wang, Steve Maybank - IEEE Transactions on Systems, Man and Cybernetics , 2004
"... Abstract—Visual surveillance in dynamic scenes, especially for humans and vehicles, is currently one of the most active research topics in computer vision. It has a wide spectrum of promising applications, including access control in special areas, human identification at a distance, crowd flux stat ..."
Abstract - Cited by 439 (6 self) - Add to MetaCart
Abstract—Visual surveillance in dynamic scenes, especially for humans and vehicles, is currently one of the most active research topics in computer vision. It has a wide spectrum of promising applications, including access control in special areas, human identification at a distance, crowd flux

Conceptual Modeling; of Audio-Visual Content

by John R. Smith, Ana B. Benitez - Proceedings of the International Conference On Multimedia and Expo (ICME-2000 , 2000
"... The explosive growth of applications involving digital audio-visual material is driving the need for more rich content description. In this paper, we present a design process for audio-visual content description. The process involves constructing a conceptual model in which entities, attributes and ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
The explosive growth of applications involving digital audio-visual material is driving the need for more rich content description. In this paper, we present a design process for audio-visual content description. The process involves constructing a conceptual model in which entities, attributes

Visual Contents in Image Retrieval

by unknown authors
"... We’re interested in ..."
Abstract - Add to MetaCart
We’re interested in

Summarization of Visual Content in Instructional Videos

by Chekuri Choudary, Tiecheng Liu - IEEE TRANSACTIONS ON MULTIMEDIA
"... In instructional videos of chalk board presentations, the visual content refers to the text and figures written on the boards. Existing methods on video summarization are not effective for this video domain because they are mainly based on low-level image features such as color and edges. In this wo ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
In instructional videos of chalk board presentations, the visual content refers to the text and figures written on the boards. Existing methods on video summarization are not effective for this video domain because they are mainly based on low-level image features such as color and edges

Indexing Images By Trees Of Visual Content

by Haim Schweitzer - In Proceedings of the Sixth International Conference on Computer Vision (ICCV'98 , 1998
"... An unsupervised algorithm for arranging an image database as a binary tree is described. Tree nodes are associated with image subsets, maintaining the property that the similarity among the images associated with the children of a node is higher than the similarity among the images associated with t ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
with the parent node. Experiments with datasets of hundreds and thousands of images show that shallow trees can produce clustering into "meaningful" classes. Visual-content search trees can be used to automate image retrieval by content, or help a human to interactively search for images. 1

ADVANCES IN VISUAL CONTENT ANALYSIS AND ADAPTATION FOR MULTIMEDIA COMMUNICATIONS

by unknown authors
"... To achieve flexible visual content adaptation for multimedia communications, the ISO/IEC MPEG and ITU-T VCEG form the Joint Video Team (JVT) to develop a scalable video coding ..."
Abstract - Add to MetaCart
To achieve flexible visual content adaptation for multimedia communications, the ISO/IEC MPEG and ITU-T VCEG form the Joint Video Team (JVT) to develop a scalable video coding

Semi-Fragile Watermarking for Authenticating JPEG Visual Content

by Ching-Yung Lin, Shih-fu Chang , 2000
"... In this paper, we propose a semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks. The authenticator can identify the positions of corrupted blocks, and recover them with approximation of the ..."
Abstract - Cited by 75 (8 self) - Add to MetaCart
In this paper, we propose a semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks. The authenticator can identify the positions of corrupted blocks, and recover them with approximation of the original ones. In addition to JPEG compression, adjustments of the brightness of the image within reasonable ranges, are also acceptable using the proposed authenticator. The security of the proposed method is achieved by using the secret block mapping function which controls the signature generating/embedding processes. Our authenticator is based on two invariant properties of DCT coecients before and after JPEG compressions. They are deterministic so that no probabilistic decision is needed in the system. The first property shows that if we modify a DCT coecient to an integral multiple of a quantization step, which is larger than the steps used in later JPEG compressions, then this coecient can be exactly reconstructed after later acceptable JPEG compression. The second one is the invariant relationships between two coecients in a block pair before and after JPEG compression. Therefore, we can use the second property to generate authentication signature, and use the first property to embed it as watermarks. There is no perceptible degradation between the watermarked image and the origianl. In additional to authentication signatures, we can also embed the recovery bits for recovering approximate pixel values in corrupted areas. Our authenticator utilizes the compressed bitstream, and thus avoids rounding errors in reconstructing DCT coecients. Experimental results showed the effectiveness of this system. The system also guarantees no false alarms, i.e., no acceptable JPEG comp...
Next 10 →
Results 1 - 10 of 10,204
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University