UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-10 of 12 Help

Filters                
Selected(0)Clear Items/Page:    Sort:
Person reidentification using quaternionic local binary pattern Conference paper
Proceedings - IEEE International Conference on Multimedia and Expo, Chengdu, PEOPLES R CHINA, JUL 14-18, 2014
Authors:  Lan R.;  Zhou Y.;  Tang Y.Y.;  Chen C.L.P.
Favorite | View/Download:8/0 | TC[WOS]:1 TC[Scopus]:15 | Submit date:2018/12/21
Feature Extraction  Local Binary Pattern  Person Reidentification  Quaternion  
A new 1D parameter-control chaotic framework Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Francisco, CA, FEB 03-05, 2014
Authors:  Hua Z.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite | View/Download:15/0 | TC[WOS]:2 TC[Scopus]:4 | Submit date:2018/12/21
Chaotic Map  Framework  Parameter-control  
A new collage steganographic algorithm using cartoon design Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Francisco, CA, FEB 03-05, 2014
Authors:  Yi S.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite | View/Download:12/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/12/21
Cartoon Design  Collage Steganography  Matrix Encoding  
Impulse noise removal using sparse representation with fuzzy weights Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Liu L.;  Philip Chen C.L.;  Zhou Y.;  Tang Y.Y.
Favorite | View/Download:12/0 | TC[WOS]:6 TC[Scopus]:6 | Submit date:2018/12/21
Image Denoising  Impulse Noise  Sparse Representation  Weighted Sparse-land Model  
A new reversible data hiding algorithm in the encryption domain Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Yi S.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite | View/Download:10/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/12/21
Differential Attack  Encryption Domain  Reversible Data Hiding  
Quaternion-based color difference measure for removing impulse noise in color images Conference paper
ICCSS 2014 - Proceedings: 2014 International Conference on Informative and Cybernetics for Computational Social Systems, Qingdao, PEOPLES R CHINA, OCT 09-10, 2014
Authors:  Chen L.;  Zhou Y.;  Chen C.L.P.
Favorite | View/Download:14/0 | TC[WOS]:0 TC[Scopus]:1 | Submit date:2018/12/21
Color Difference  Color Image Denoising  Noise Detector  Quaternion  
Multi-scale patch based box kernels for hyperspectral image classification Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Peng J.;  Zhou Y.;  Chen C.L.P.
Favorite | View/Download:13/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/12/21
Box Kernels  Classification  Hyperspectral Image  Multi-scale  Support Vector Machine  
A lossless (2, 8)-chaos-based secret image sharing scheme Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Bao L.;  Zhou Y.;  Chen C.L.P.
Favorite | View/Download:11/0 | TC[WOS]:1 TC[Scopus]:0 | Submit date:2018/12/21
Chaotic System  Image Encryption  Secret Image Sharing  
Spatial-spectral metric learning for hyperspectral remote sensing image classification Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Diego, CA, AUG 18, 2014
Authors:  Peng J.;  Zhou Y.;  Chen C.L.P.
Favorite | View/Download:12/0 | TC[WOS]:1 TC[Scopus]:1 | Submit date:2018/12/21
Classification  Dimension Reduction  Hyperspectral Image  Metric Learning  
Combining two strategies to optimize biometric decisions against spoofing attacks Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Diego, CA, AUG 18-20, 2014
Authors:  Li W.;  Poh N.;  Zhou Y.
Favorite | View/Download:10/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/12/21
Biometric Authorization  Biometric Verification  Spoof Attack