3rd European Workshop on Visual Information Processing

4-6 July 2011

Filter Results

Displaying Results 1 - 25 of 66
  • [Title page]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (384 KB)
    Freely Available from IEEE
  • Plenary speakers

    Publication Year: 2011, Page(s):20 - 22
    Request permission for commercial reuse | PDF file iconPDF (484 KB)
    Freely Available from IEEE
  • Abstracts

    Publication Year: 2011, Page(s):23 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (639 KB) | HTML iconHTML

    Presents abstracts for the articles comprising the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authors index

    Publication Year: 2011, Page(s):81 - 82
    Request permission for commercial reuse | PDF file iconPDF (494 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (308 KB)
    Freely Available from IEEE
  • Best Student Paper Award

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Technical program at a glance

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (478 KB)
    Freely Available from IEEE
  • Message of the co-chairs

    Publication Year: 2011, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (462 KB)
    Freely Available from IEEE
  • Message from the Technical Program Co-chairs

    Publication Year: 2011, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (460 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (460 KB)
    Freely Available from IEEE
  • Technical committee

    Publication Year: 2011, Page(s):5 - 6
    Request permission for commercial reuse | PDF file iconPDF (461 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011, Page(s):7 - 8
    Request permission for commercial reuse | PDF file iconPDF (462 KB)
    Freely Available from IEEE
  • Technical program

    Publication Year: 2011, Page(s):9 - 19
    Request permission for commercial reuse | PDF file iconPDF (529 KB)
    Freely Available from IEEE
  • Genetic algorithm clustering for color image quantization

    Publication Year: 2011, Page(s):83 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    Clustering is an unsupervised classification method used for different issues in image analysis. Genetic algorithms are randomized search and optimisation techniques. In this paper, we present a genetic algorithm clustering for color image quantization as a prior process to any other one for image analysis. A fitness function with a smallest number of variables is proposed. It's based on the fuzzy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical analysis of the quantization stage of robust perceptual image hashing

    Publication Year: 2011, Page(s):274 - 279
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7198 KB) | HTML iconHTML

    In this paper, we consider the problem of the quantization stage of robust perceptual image hashing in authentication application. The main goal of our analysis is to study the behavior of the extracted image features to be hashed against malicious/non-malicious manipulations. In our analysis, we consider only an additive noise. Note that even if the noise is small, it can cause errors during the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cardiac motion analysis using factorization method

    Publication Year: 2011, Page(s):134 - 137
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1977 KB) | HTML iconHTML

    An image stream can be represented by 2FxP measurement matrix of the image coordinates of P points tracked through F frames. We show that under orthographic projection this matrix is of rank 3. Using this observation, the factorization method uses the singular value decomposition technique to factor the measurement matrix into two matrices which represent object shape and the motion respectively. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Objective validation of a dynamical and plausible computational model of visual attention

    Publication Year: 2011, Page(s):223 - 228
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2083 KB) | HTML iconHTML

    Building a generic and highly capable vision system is still an open research problem. Actually, real-world vision systems need to face the challenge of dimensionality and ambiguity of data. To tackle this problem we introduced, in [1], a dynamic computational model of visual attention. This latter selects the most salient scene information while being able to adapt its behavior to the needs of a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid watermarking scheme for CCL-applied video contents

    Publication Year: 2011, Page(s):199 - 204
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3220 KB) | HTML iconHTML

    With widely spread user-generated video contents through the Internet, copyright protection issues have been arising. In this situation, creative commons license(CCL) has been introduced to make convenient sharing environment and reflect intention of content creators. However, the CCL is prone to be ignored by users because it is not protected by law or technical methods. In order for technical he... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Co-operative surveillance cameras for high quality face acquisition in a real-time door monitoring system

    Publication Year: 2011, Page(s):99 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1754 KB) | HTML iconHTML

    The increasing number of CCTV cameras in use poses a problem of information overloading for end users. Smart technologies are used in video surveillance to automatically analyze and detect events of interest in real-time, through 2D and 3D video processing techniques called video analytics. This paper presents a smart surveillance stereo vision system for real-time intelligent door access monitori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective and efficient visual quality index based on local edge gradients

    Publication Year: 2011, Page(s):162 - 167
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3049 KB) | HTML iconHTML

    The structural similarity index measure is a well known and widely used full reference visual quality index. In this paper we introduce a new full reference visual quality index based on local edges and edge gradients in the wavelet domain. The proposed metric corresponds better to human judgement and is more efficient, in terms of computational complexity, than the structural similarity index mea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • No-reference blurred image quality assessment

    Publication Year: 2011, Page(s):168 - 173
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2246 KB) | HTML iconHTML

    In the aim to reduce blur in images, one could perform a No-Reference image quality assessment to control blur reduction. In this paper, a novel No-Reference blur image quality metric is proposed. This approach is based on a new Multiplicative Multiresolution Decomposition MMD. The blur is analyzed through MMD scales and a blur metric is deduced. We have also shown that the highlighted transform c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Orientation histogram of SIFT displacement for recognizing actions in broadcast videos

    Publication Year: 2011, Page(s):286 - 291
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2320 KB) | HTML iconHTML

    Human actions are diversified and complicated, and hence difficult to be recognized by artificial intelligence systems. Recognizing actions in broadcast videos is even more challenging due to low resolution and frame rate. During the past decades, many talented researchers are devoted to this field, and several promising algorithms are developed to achieve great performance. The well known methods... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Markov Random Fields using complex line process: An application to Bayesian image restoration

    Publication Year: 2011, Page(s):30 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1204 KB) | HTML iconHTML

    The problem of image restoration is considered, where the goal is to recover the original image starting from its blurred and noisy degraded version. A Bayesian restoration procedure is introduced based on modeling the image given the measurements as a Markov Random Fields characterized by spatially variant local priors. A suitable complex valued line process is introduced, generalizing previous l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Block ridgelet and SVM based fingerprint matching

    Publication Year: 2011, Page(s):247 - 251
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1944 KB) | HTML iconHTML

    Fingerprint matching has been deployed in a variety of security related applications. Traditional minutia detection based identification algorithms do not utilize the rich discriminatory texture structure of fingerprint images. Furthermore, minutia detection requires substantial improvement of image quality. And the efficiency of minutia detection depends on how well the ridges and valleys are ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.