skip to main content
Volume 76, Issue 6March 2017
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISSN:1380-7501
Reflects downloads up to 06 Jan 2025Bibliometrics
article
Video-based human action and hand gesture recognition by fusing factored matrices of dual tensors

In this paper, we present a novel approach for human action and gesture recognition using dual-complementary tensors. In particular, the proposed method constructs a compact and yet discriminative representation by normalizing the input video volume ...

article
An improved 3D wavelet-based scalable video coding codec for MC-EZBC

With the rapid growth of modern multimedia applications, 3D wavelet-based scalable video coding (SVC) codec has received considerable attention lately because of its high coding performance and flexibility in bitstream scalability. It combines the ...

article
Image retrieval based on exponent moments descriptor and localized angular phase histogram

Multiple feature extraction and combination is one of the most important issues in the content-based image retrieval (CBIR). In this paper, we propose a new content-based image retrieval method based on an efficient combination of shape and texture ...

article
A divide-and-conquer hole-filling method for handling disocclusion in single-view rendering

Large holes are unavoidably generated in depth image based rendering (DIBR) using a single color image and its associated depth map. Such holes are mainly caused by disocclusion, which occurs around the sharp depth discontinuities in the depth map. We ...

article
A secure image sharing scheme with high quality stego-images based on steganography

Image sharing can be utilized to protect important commercial, military or private images against a single point of failure. Many existing image sharing schemes may have one or more of the security weaknesses as follows: First, noise-like image shares ...

article
EmoAssist: emotion enabled assistive tool to enhance dyadic conversation for the blind

This paper presents the design and implementation of EmoAssist: a smart-phone based system to assist in dyadic conversations. The main goal of the system is to provide access to more non-verbal communication options to people who are blind or visually ...

article
A coding-guided holistic-based palmprint recognition approach

In the past few years, the need for accuracy and robustness against luminosity variations has drawn a considerable share of the palmprint research toward coding-based approaches. However, on the downside coding-based approaches require a high ...

article
A novel forensic image analysis tool for discovering double JPEG compression clues

This paper presents a novel technique to discover double JPEG compression traces. Existing detectors only operate in a scenario that the image under investigation is explicitly available in JPEG format. Consequently, if quantization information of JPEG ...

article
Adaptive robust video broadcast via satellite

With increasing demand for multimedia content over channels with limited bandwidth and heavy packet losses, higher coding efficiency and stronger error resiliency is required more than ever before. Both the coding efficiency and error resiliency are two ...

article
Facial expression recognition based on local region specific features and support vector machines

Facial expressions are one of the most powerful, natural and immediate means for human being to communicate their emotions and intensions. Recognition of facial expression has many applications including human-computer interaction, cognitive science, ...

article
2D and 3D shape retrieval using skeleton filling rate

As an increasing number of digital images are generated, a demand for an efficient and effective image retrieval mechanisms grows. In this work, we present a new skeleton-based algorithm for 2D and 3D shape retrieval. The algorithm starts by drawing ...

article
A novel method for digital image steganography based on a new three-dimensional chaotic map

This paper, presents a novel chaos-based image steganography algorithm. Because of efficient property of chaos based security systems besides steganography applicability in providing secure communication, chaos based steganography algorithms served as a ...

article
Improved fuzzy clustering algorithm with non-local information for image segmentation

Fuzzy C-means(FCM) has been adopted to perform image segmentation due to its simplicity and efficiency. Nevertheless it is sensitive to noise and other image artifacts because of not considering spatial information. Up to now, a series of improved FCM ...

article
Graph-based multimodal clustering for social multimedia

Real world datasets often consist of data expressed through multiple modalities. Clustering such datasets is in most cases a challenging task as the involved modalities are often heterogeneous. In this paper we propose a graph-based multimodal ...

article
Recognition of facial expressions based on salient geometric features and support vector machines

Facial expressions convey nonverbal cues which play an important role in interpersonal relations, and are widely used in behavior interpretation of emotions, cognitive science, and social interactions. In this paper we analyze different ways of ...

article
Scalable video summarization via sparse dictionary learning and selection simultaneously

Every day, a huge amount of video data is generated worldwide and processing this kind of data requires powerful resources in terms of time, manpower, and hardware. Therefore, to help quickly understand the content of video data, video summarization ...

article
LSB based non blind predictive edge adaptive image steganography

Image steganography is the art of hiding secret message in grayscale or color images. Easy detection of secret message for any state-of-art image steganography can break the stego system. To prevent the breakdown of the stego system data is embedded in ...

article
Image palette: painting style transfer via brushstroke control synthesis

As one kind of technology of style transfer, painting style transfer can be used to render the sample images with a specific art style. With this technology, we can render the target images in the same style as the samples after some computation. We ...

article
An effective CU size decision method for quality scalability in SHVC

The Scalable extension of the High Efficiency Video Coding (known as SHVC) combines the high compression efficiency with the possibility of encoding different resolutions of the same encoded video in a single bitstream. However, this is accompanied with ...

article
Noise robust and rotation invariant entropy features for texture classification

In this paper, a new formula is proposed that uses local entropy for texture feature extraction. This new method is similar to entropy; however, it calculates the local entropy of each local patch of textures. Entropy (ENT) is an attribute that measures ...

article
Hybrid image retargeting using optimized seam carving and scaling

We present a novel hybrid scheme for content-aware image retargeting that allows retargeting images into arbitrary dimensions while preserving visually prominent features and minimizing global information loss. One of the novelties in our scheme is an ...

article
A new image cryptosystem based on 2D hyper-chaotic system

An efficient image encryption scheme is designed based on 2D hyper-chaotic system. Different from the traditional chaos-based image encryption schemes, the confusion and the diffusion procedures of the proposed scheme are interacted on each other. In ...

article
A practical computer based vision system for posture and movement sensing in occupational medicine

Back pain and upper extremities injuries due to overexertion account for over twenty percent of leave days from work in the US. This explains why a vast amount of initiatives have been, to this date, carried out aiming at reducing the occurrence of such ...

article
A modified LOT model for image denoising

In image processing, it is often desirable to remove the noise and preserve image features. Due to the strong edge preserving ability, the total variation (TV) based regularization has been widely studied. However, it produces undesirable staircase ...

article
A method of 3D CAD model retrieval based on spatial bag of words

In order to improve both the discriminative power for models' local parts and the searching efficiency in 3D CAD model retrieval, a novel hierarchical feature descriptor for retrieval based on spatial bag of words is proposed in this paper. By ...

article
Image fusion based on simultaneous empirical wavelet transform

In this paper, a new multi-scale image fusion algorithm for multi-sensor images is proposed based on Empirical Wavelet Transform (EWT). Different from traditional wavelet transform, the wavelets of EWT are not fixed, but the ones generated according to ...

article
Synthesis of simulation and implementation code for OpenMAX multimedia heterogeneous systems from UML/MARTE models

The design of multimedia systems is becoming a more and more challenging task due to the combination of growing functionalities and strict performance requirements along with reduced time-to-market. In this context, the OpenMAX initiative defines a ...

article
Web-based multimedia hand-therapy framework for measuring forward and inverse kinematic data

Recognizing rotational and angular hand movements using a non-invasive way is a challenging task. In this paper, we present a web-based multimedia hand-Therapy framework that can dynamically provide therapy services to a patient having Hemiplegia ...

article
Image encryption based on random projection partition and chaotic system

Image encryption is a useful technique of multimedia security and has been widely used in content protection, image authentication, data hiding, and so on. In this paper, we investigate the use of projection partition in image encryption, and then ...

article
A study on skeletonization of complex petroglyph shapes

In this paper, we present a study on skeletonization of real-world shape data. The data stem from the cultural heritage domain and represent contact tracings of prehistoric petroglyphs. Automated analysis can support the work of archeologists on the ...

Comments