- Image and Object Detection Techniques
- Handwritten Text Recognition Techniques
- Biometric Identification and Security
- Advanced Steganography and Watermarking Techniques
- Image Processing and 3D Reconstruction
- Video Surveillance and Tracking Methods
- User Authentication and Security Systems
- Digital Media Forensic Detection
- Anomaly Detection Techniques and Applications
- Image Retrieval and Classification Techniques
- Human Pose and Action Recognition
- Medical Image Segmentation Techniques
- Advanced Vision and Imaging
- Video Analysis and Summarization
- 3D Surveying and Cultural Heritage
- Digital Image Processing Techniques
- Advanced Authentication Protocols Security
- Industrial Vision Systems and Defect Detection
- Optical measurement and interference techniques
- Advanced Image and Video Retrieval Techniques
- Gait Recognition and Analysis
- Digital and Cyber Forensics
- QR Code Applications and Technologies
- Face recognition and analysis
- Digital Imaging for Blood Diseases
Nokia (United States)
2002-2021
University of Arkansas at Little Rock
2020
Avaya (United States)
2002-2009
Avaya (Bermuda)
2003-2009
Carnegie Mellon University
1984-2005
AT&T (United States)
1987-2003
Page layout analysis is a document processing technique used to determine the format of page. This paper describes spectrum (or docstrum), which method for structural page based on bottom-up, nearest-neighbor clustering components. The yields an accurate measure skew, within-line, and between-line spacings locates text lines blocks. It advantageous over many other methods in three main ways: independence from skew angle, different spacings, ability process local regions orientations within...
For decades, the password has been standard means for user authentication on computers. However, as users are required to remember more, longer, and changing passwords, it is evident that a more convenient secure solution necessary. This paper examines security tokens, biometrics-which we collectively call authenticators-and compares these authenticators their combinations. We examine effectiveness against several attacks suitability particular specifications such compromise detection...
Modern computer networks make it possible to distribute documents quickly and economically by electronic means rather than conventional paper means. However, the widespread adoption of distribution copyrighted material is currently impeded ease unauthorized copying dissemination. In this we propose techniques that discourage embedding each document with a unique codeword. Our encoding are indiscernible readers, yet enable us identify sanctioned recipient examination recovered document. We...
Continues a study of document marking to deter illicit dissemination. An experiment performed reveals that the distortion on photocopy is very different in vertical and horizontal directions. This leads strategy marks text line both vertically using shifting horizontally word shifting. A marked always accompanied by two unmarked control lines one above below. They are used measure distortions directions order decide whether or shift should be detected. Line shifts detected centroid method...
The Internet revolution is now in full swing, and commercial interests abound. As with other maturing media technologies, the focus moving from technology to content, as vendors developers try use network deliver products for profit. This shift inevitably raises questions about how protect ownership rights. Digital watermarking has been proposed a way identify source, creator, owner, distributor, or authorized consumer of document image. Its objective permanently unalterably mark image so...
Modern computer networks make it possible to distribute documents quickly and economically by electronic means rather than conventional paper means. However, the widespread adoption of distribution copyrighted material is currently impeded ease illicit copying dissemination. The authors propose techniques that discourage embedding each document with a unique codeword. encoding are indiscernible readers, yet enable one identify sanctioned recipient examination recovered document. three coding...
The RightPages electronic library prototype system, which gives users full online services, is described. takes advantage of fast hardware, multimedia workstations, and broadband networks to process scientific technical journals for offer a service that: alerts them the arrival new journal articles matching their interest profiles; lets immediately examine images pages in alerted browse through other database; enables order paper copies any database. system runs on local area network that...
Analysis of globally disordered, nonequilibrium "labyrinthine" stripe-domain patterns in thin ferrimagnetic garnet films has revealed a well-defined local structure containing an oblong polygonal plaquette as the fundamental motif. Two types labyrinths were found: one having topological defects, other composed single, unbranched, meandering line. These emerge when labyrinthine state is approached either by heating at constant magnetic field or demagnetizing from saturation temperature. Size...
The guest editors provide an overview of the articles selected for this special issue. issue's goal is to document current state-of-the-art, acknowledge latest breakthroughs achieved by scientists working in area biometric recognition, and identify future promising research areas. It thought selection papers discussed should give readers a good idea where researchers have been focusing, both on long- studied problems still needing more work newer challenges. A fundamental field biometrics...
The converging squares algorithm is a method for locating peaks in sampled data of two dimensions or higher. There are primary advantages this over conventional methods. First, it robust with respect to noise and type. no empirical parameters permit adjustment the process, so results completely objective. Second, computationally efficient. inherent structure that resolution pyramid. This enhances computational efficiency as well contributing quality immunity method. detailed two-dimensional...
Describes some of the document processing techniques used in RightPages electronic library system. Since system deals with scanned images pages, these are critical to use and appearance The author describes three techniques: (1) for noise reduction from binary pages improve page subsequent optical character recognition compression; (2) subsampling text image fit on computer screen white maintaining readability; (3) a layout analysis technique determine blocks.< <ETX...
The use of object-oriented database principles to help model an image for computer vision, specifically, line-image analysis, is described. resulting representation, called thin line code (TLC), general across known applications and extensible new applications. TLC's advantages, also some difficulties it has in strictly adhering traditional notions object orientation, are addressed. A review relevant aspects modeling included.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML"...
A procedure for filter design is described enhancing fingerprint images. Four steps of this are described: user specification appropriate image features, determination local ridge orientations throughout the image, smoothing orientation and pixel-by-pixel enhancement by application oriented, matched masks. The contribution work to quantify justify functional relationships between features parameters so that process can be easily modified different conditions noise scale. Application shows...