- Video Surveillance and Tracking Methods
- Face and Expression Recognition
- Video Analysis and Summarization
- Advanced Vision and Imaging
- Advanced Image and Video Retrieval Techniques
- Advanced Steganography and Watermarking Techniques
- Face recognition and analysis
- Human Pose and Action Recognition
- Chaos-based Image/Signal Encryption
- Digital Media Forensic Detection
- Image Retrieval and Classification Techniques
- Robotics and Sensor-Based Localization
- Music and Audio Processing
- Advanced Neural Network Applications
- Gait Recognition and Analysis
- Image and Signal Denoising Methods
- 3D Surveying and Cultural Heritage
- Hand Gesture Recognition Systems
- Computer Graphics and Visualization Techniques
- Classical Antiquity Studies
- Neural Networks and Applications
- Speech and Audio Processing
- Emotion and Mood Recognition
- Medical Image Segmentation Techniques
- Endodontics and Root Canal Treatments
Aristotle University of Thessaloniki
2015-2024
University of Macedonia
2003-2024
Athens University of Economics and Business
2023
Papageorgiou General Hospital
2014-2022
International Hellenic University
2020
University of Bristol
2017
University of the Aegean
2013
Information Technologies Institute
2009-2012
Alexander Technological Educational Institute of Thessaloniki
2011
Centre for Research and Technology Hellas
2009-2011
The audio watermarking method proposed in this paper offers copyright protection to an signal by time domain processing. strength of modifications is limited the necessity produce output that perceptually similar original one. presented here does not require use for watermark detection. generated using a key, i.e., single number known only owner. Watermark embedding depends on amplitude and frequency way minimizes audibility signal. embedded robust common manipulations like MPEG coding,...
A method for copyright protection of digital images is presented. Copyright achieved by embedding an "invisible" signal, known as signature, in the image. Signature casting performed spatial domain slightly modifying intensity level randomly selected image pixels. detection done comparing mean value marked pixels against that not Statistical hypothesis testing used this purpose. The signature can be designed such a way it resistant to JPEG compression and lowpass filtering. This minimizing...
In this paper a new multi-view/3D human action/interaction database is presented. The has been created using convergent eight camera setup to produce high definition multi-view videos, where each video depicts one of persons performing twelve different motions. Various types motions have recorded, i.e., scenes person performs specific movement, executes movements in succession and two interact with other. Moreover, the subjects body sizes, clothing are sex, nationalities, etc.. videos...
Camera-equipped unmanned aerial vehicles (UAVs), or "drones," are a recent addition to standard audiovisual shooting technologies. As drone cinematography is expected further revolutionize media production, this paper presents an overview of the state-of-the-art in area, along with brief review current commercial UAV technologies and legal restrictions on their deployment. A novel taxonomy visual building blocks, context filming outdoor events where targets (e.g., athletes) must be actively...
An integrated methodology for the detection and removal of cracks on digitized paintings is presented in this paper. The are detected by thresholding output morphological top-hat transform. Afterward, thin dark brush strokes which have been misidentified as removed using either a median radial basis function neural network hue saturation data or semi-automatic procedure based region growing. Finally, crack filling order statistics filters controlled anisotropic diffusion performed. has shown...
Autonomous UAV cinematography is an active research field with exciting potential for the media industry. It bears promise of greatly facilitating shooting various applications, while significantly reducing costs compared to manual shooting. However, general problem has not been clearly defined and challenges arising from current legislation technology restrictions have fully charted. A complete overview issues related autonomous needed, pertaining situation in field, so as guide...
Bio-based poly(lactic acid) (PLA) composite films were produced using unmodified soda micro- or nano-lignin as a green filler at four different contents, between 0.5 wt% and 5 wt%. The PLA-lignin polymers synthesized by solvent casting to prepare masterbatch, followed melt mixing. composites then converted into films, evaluate the effect of lignin content size on their physicochemical mechanical properties. Differential scanning calorimetry (DSC), supported polarized light microscopy (PLM),...
Plenty of methods have been proposed in order to discover latent variables (features) data sets. Such approaches include the principal component analysis (PCA), independent (ICA), factor (FA), etc., mention only a few. A recently investigated approach decompose set with given dimensionality into lower dimensional space is so-called nonnegative matrix factorization (NMF). Its requirement that both decomposition factors are nonnegative. To approximate original data, minimization NMF objective...
This paper presents a novel approach for combining optical flow into enhanced 3D motion vector fields human action recognition. Our detects of the actors by computing in video data captured multi-view camera setup with an arbitrary number views. Optical is estimated each view and extended to using reconstructions pixel-to-vertex correspondences. The resulting combined field taking significance local its reliability account. Motion Context (3D-MC) Harmonic (HMC) are used represent extracted...
Usage of digital media has witnessed a tremendous growth during the last decades, as result their notable benefits in efficient storage, ease manipulation and transmission. However these features make vulnerable to copyright infringement, tampering unauthorized distribution. In five years protection information received significant attention within community, number techniques that try address problem by hiding appropriate (e.g. or authentication data) have been proposed. this paper we...
In this paper we describe a general framework for image copyright protection through digital watermarking. particular present the main features of an efficient watermarking scheme, discuss robustness issues and three stages algorithm namely watermark generation, embedding detection.
Abstract-Polygonal lines constitute a key graphical primitive in 2D vector graphics data. Thus, the ability to apply digital watermark such an entity would enable watermarking of cartoons, drawings, and Geographical Information Systems (GIS) data format. This paper builds on extends existing algorithm that achieves polygonal line by modifying Fourier descriptors magnitude imperceptible way. Watermarks embedded this technique can be detected rotated, translated, scaled, or reflected lines....
The recent mass commercialization of affordable unmanned aerial vehicles (UAVs), known as drones, has significantly altered the media production landscape, allowing for easy acquisition impressive footage. Relevant applications include movies, TV shows, or commercials well filming outdoor events news stories. In near future, increased drone autonomy is expected to reduce shooting costs and shift focus creative process, rather than minutiae UAV operation. This article introduces surveys...
Recent advances in artificial intelligence, control and sensing technologies have facilitated the development of autonomous Unmanned Aerial Vehicles (UAVs, or drones) able to self-navigate various settings. Although these already entered a mature stage, ensuring flight safety crowded areas performing an emergency landing case malfunctions, while adhering relevant legislation, is generally treated as afterthought when designing UAV platforms for unstructured environments. This paper proposes...
Non-maximum suppression (NMS) is a post-processing step in almost every visual object detector. NMS aims to prune the number of overlapping detected candidate regions-of-interest (RoIs) on an image, order assign single and spatially accurate detection each object. The default algorithm (GreedyNMS) fairly simple suffers from severe drawbacks, due its need for manual tuning. A typical case failure with high application relevance pedestrian/person presence occlusions, where GreedyNMS doesn't...