By Topic

Computer Vision, Graphics & Image Processing, 2008. ICVGIP '08. Sixth Indian Conference on

Date 16-19 Dec. 2008

Filter Results

Displaying Results 1 - 25 of 111
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Message from the General Co-chairs

    Publication Year: 2008, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (32 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-chairs

    Publication Year: 2008, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (36 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee Members

    Publication Year: 2008, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2008, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2008, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Robust Watermarking Scheme Based on Multiresolution Fractional Fourier Transform

    Publication Year: 2008, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1083 KB) | HTML iconHTML

    In this paper, a new robust watermarking scheme is proposed in multiresolution fractional Fourier transform domain using singular value decomposition. The watermark is embedded in the high frequency sub-band of the host image at coarsest level. Although the schemes based on SVD are robust but fail under ambiguity attacks. In this attack, both the owner and attacker can extract their watermark from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Clustering Based Non-linear Filter for the Restoration of Impulse Corrupted Digital Images

    Publication Year: 2008, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (677 KB) | HTML iconHTML

    The paper proposes a 2D impulse filtering algorithm for the restoration of salt & pepper impulse corrupted digital images. The algorithm incorporates a hard-C means clustering stage to facilitate pixel classification in the impulse detection phase and an efficient adaptive filtering scheme in the restoration phase. The impulse detection scheme of the algorithm avoids mis-classification of sign... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impulse Noise Removal from Color Images with Hopfield Neural Network and Improved Vector Median Filter

    Publication Year: 2008, Page(s):17 - 24
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1034 KB) | HTML iconHTML

    In this paper, a novel and effective method for impulse noise removal in corrupted color images is discussed. The new method consists of two phases. The first phase is a noise detection phase where a modified Hopfield neural network is used to detect impulse noise pixels. The second is a noise filtering phase where the disadvantage of taking vector median in a single color space is addressed and a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Denoising Using Matched Biorthogonal Wavelets

    Publication Year: 2008, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1415 KB) | HTML iconHTML

    Current denoising techniques use the classical ortho normal wavelets for decomposition of an image corrupted with additive white Gaussian noise, upon which various thresholding strategies are built. The use of available biorthogonal wavelets in image denoising is less common because of their poor performance. In this paper, we present a method to design image-matched biorthogonal wavelet bases and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Edge Detectors Based Anisotropic Diffusion for Enhancement of Digital Images

    Publication Year: 2008, Page(s):33 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2744 KB) | HTML iconHTML

    Using the edge detection techniques we propose a new enhancement scheme for noisy digital images. This uses inhomogeneous anisotropic diffusion scheme via the edge indicator provided by well known edge detection methods. Addition of a fidelity term facilitates the proposed scheme to remove the noise while preserving edges. This method is general in the sense that it can be incorporated into any of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles

    Publication Year: 2008, Page(s):39 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1244 KB) | HTML iconHTML

    We present an Audio-visual person authentication system which extracts several novel ldquovisualized-speech-featuresrdquo (VSF) from the spoken-password and multiple face profiles using a simple user-interface and combine these features to deliver high performance and resilience against imposter attacks. The spoken password is converted to a string of images formed by several visualized speech fea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visibility Cuts: A System for Rendering Dynamic Virtual Environments

    Publication Year: 2008, Page(s):47 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (957 KB) | HTML iconHTML

    The subject of occlusion culling of large 3D environments has received substantial contribution. However the major amount of research into the area has focussed on occlusion culling of static scenes using spatial partitioning. The primary aim of all these schemes is to minimize the load on the GPU by reducing the number of primitives to be rendered. We present an efficient algorithm for visibility... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-scale Method for Adaptive Mesh Editing Based on Rigidity Estimation

    Publication Year: 2008, Page(s):55 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1114 KB) | HTML iconHTML

    We present a multi-scale approach for direct manipulation of mesh models based on pre-estimated rigidity. Our method enhances space deformation by constructing a novel deformable structure with several layers of deformation graphs which have different densities of control nodes. An appropriate deformation graph is dynamically chosen according to the handle configuration. Such handle-aware strategy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Explosion Simulation Using Compressible Fluids

    Publication Year: 2008, Page(s):63 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1351 KB) | HTML iconHTML

    We propose a novel physically based method to simulate explosions and other compressible fluid phenomena. The method uses compressible Navier Stokes equations for modeling the explosion with a Semi-Lagrangian integration method. The proposed integration method addresses the issues of stability and larger timesteps. This is achieved by modifying the Semi-Lagrangian method to reduce dissipation and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algebraic Splats Representation for Point Based Models

    Publication Year: 2008, Page(s):71 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2241 KB) | HTML iconHTML

    The primitives of point-based representations are independent but are rendered using surfels, which approximate the immediate neighborhood of each point linearly. A large number of surfels are needed to convey the exact shape. Higher-order approximations of the local neighborhood have the potential to represent the shape using fewer primitives, simultaneously achieving higher rendering speeds. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scalable Projective Bundle Adjustment Algorithm using the L infinity Norm

    Publication Year: 2008, Page(s):79 - 86
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    The traditional bundle adjustment algorithm for structure from motion problem has a computational complexity of O((m+n)3) per iteration and memory requirement of O(mn(m+n)), where m is the number of cameras and n is the number of structure points. The sparse version of bundle adjustment has a computational complexity of O(m3+mn) per iteration and memory requirement of O(mn). ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequency Domain Visual Servoing Using Planar Contours

    Publication Year: 2008, Page(s):87 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (663 KB) | HTML iconHTML

    Fourier domain methods have had a long association with geometric vision. In this paper, we introduce Fourier domain methods into the field of visual servoing for the first time. We show how different properties of Fourier transforms may be used to address specific issues in traditional visual servoing methods, giving rise to algorithms that are more flexible. Specifically, we demonstrate how Four... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monocular Depth by Nonlinear Diffusion

    Publication Year: 2008, Page(s):95 - 102
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    Following the phenomenological approach of gestaltists, sparse monocular depth cues such as T- and X-junctions and the local convexity are crucial to identify the shape and depth relationships of depicted objects. According to Kanizsa, mechanisms called a modal and modal completion permit to transform these local relative depth cues into a global depth reconstruction. In this paper, we propose a m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptation and Learning for Image Based Navigation

    Publication Year: 2008, Page(s):103 - 110
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    Image based methods are a new approach for solving problems in mobile robotics. Instead of building a metric (3D) model of the environment, these methods work directly in the sensor (image) space. The environment is represented as a topological graph in which each node contains an image taken at some pose in the workspace, and edges connect poses between which a simple path exists. This type of re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning Feature Trajectories Using Gabor Filter Bank for Human Activity Segmentation and Recognition

    Publication Year: 2008, Page(s):111 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    We describe a novel method for human activity segmentation and interpretation in surveillance applications based on Gabor filter-bank features. A complex human activity is modeled as a sequence of elementary human actions like walking, running, jogging, boxing, hand-waving etc. Since human silhouette can be modeled by a set of rectangles, the elementary human actions can be modeled as a sequence o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.