State of the art in passive digital image forgery detection: copy-move image forgery
Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is ...
Obtaining calibrated probability using ROC Binning
Obtaining calibrated probability, or actual occurrence, is crucial in many real problems because it effectively supports the decision-making process with good assessment of cost and effect. Estimating calibrated probability is a more significant issue ...
An algorithm on sign words extraction and recognition of continuous Persian sign language based on motion and shape features of hands
Sign language is the most important means of communication for deaf people. Given the lack of familiarity of non-deaf people with the language of deaf people, designing a translator system which facilitates the communication of deaf people with the ...
Recursive reconstruction of non-facial components using support vector data description
To distinguish non-facial components, such as glasses, scarves, and hair, this study proposes a recursive reconstruction method using support vector data description that estimates the approximate face by determining the minimum distance between the ...
Dedicated feature descriptor for outdoor augmented reality detection
Stable augmented reality applications consist of an accurate registration supported by a robust tracking module. In outdoor locations, the changing environmental and light conditions compromise this tracking. Reliable descriptors under unsettled ...
A sequential pattern mining approach to design taxonomies for hierarchical music genre recognition
In this paper, music genre taxonomies are used to design hierarchical classifiers that perform better than flat classifiers. More precisely, a novel method based on sequential pattern mining techniques is proposed for the extraction of relevant ...
Dealing with overlap and imbalance: a new metric and approach
This paper addresses learning in complex scenarios involving imbalance and overlap. We propose a novel measure, the Augmented R-value, for estimating the level of overlap in the data. It improves an existing model-based measure, by including the data ...
Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators
With the emergence of biometric-based authentication systems in real-world applications, template protection in biometrics is a significant issue to be considered in the recent years. This paper presents two feature set computation algorithms, namely ...
Unconstrained handwritten digit recognition using perceptual shape primitives
In this paper, we propose a new handwritten digit recognition method which works in a very similar way as human perception. The digit image boundary is decomposed into four salient visual primitives, namely closure, smooth curve, protrusion and straight ...
Gaze stability for liveness detection
Spoofing attacks on biometric systems are one of the major impediments to their use for secure unattended applications. This paper explores features for face liveness detection based on tracking the gaze of the user. In the proposed approach, a visual ...
Robust copy---move forgery detection using quaternion exponent moments
The detection of forgeries in color images is a very important topic in forensic science. Copy---move (or copy---paste) forgery is the most common form of tampering associated with color images. Conventional copy---move forgeries detection techniques ...
Content-based image retrieval in DCT compressed domain with MPEG-7 edge descriptor and genetic algorithm
In this paper, we propose a content-based image retrieval scheme in discrete cosine transform compressed domain with the help of genetic algorithm (GA). A combination of three image features, i.e., color histogram, color moments, and edge histogram, is ...
Automatic initialization of active contours in ultrasound images of breast cancer
Gradient vector flow (GVF) snakes are an efficient method for segmentation of ultrasound images of breast cancer. However, the method produces inaccurate results if the seeds are initialized improperly (far from the true boundaries and close to the ...
Nonnegative matrix factorization with Hessian regularizer
Because of the underlying data structure preserved by the manifold regularization term, the Nonnegative matrix factorization (NMF) with manifold regularizer demonstrates an advantage over the variants of NMF for many data analysis tasks. Currently,...
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure-free electroencephalography signals
Properly determining the discriminative features which characterize the inherent behaviors of electroencephalography (EEG) signals remains a great challenge for epileptic seizure detection. In this present study, a novel feature selection scheme based ...
Facial beauty analysis based on features prediction and beautification models
This paper studies facial beauty analysis by using feature-based computer models in prediction and beautification. In order to assess the facial beauty index, a facial beauty prediction model is established, which can quickly and effectively estimate ...
Performing event detection in time series with SwiftEvent: an algorithm with supervised learning of detection criteria
The automated detection of points in a time series with a special meaning to a user, commonly referred to as the detection of events, is an important aspect of temporal data mining. These events often are points in a time series that can be peaks, level ...
Precise segmentation of the bulbar conjunctiva for hyperaemia images
- Luisa Sánchez Brea,
- Noelia Barreira Rodríguez,
- Antonio Mosquera González,
- Hugo Pena-Verdeal,
- Eva Yebra-Pimentel Vilar
Hyperaemia is an excess of blood in a tissue that causes the appearance of an unusual red hue in the affected area. It is a common occurrence in the bulbar conjunctiva, where it can be related to multiple pathologies, such as conjunctivitis or dry eye ...
Reservoir-based network traffic stream summarization for anomaly detection
Summarization is an important intermediate step for expediting knowledge discovery tasks such as anomaly detection. In the context of anomaly detection from data stream, the summary needs to represent both anomalous and normal data. But streaming data ...
Automatic identification of Scenedesmus polymorphic microalgae from microscopic images
- Jhony-Heriberto Giraldo-Zuluaga,
- Augusto Salazar,
- German Diez,
- Alexander Gomez,
- Tatiana Martínez,
- J. F. Vargas,
- Mariana Peñuela
Microalgae counting is used to measure biomass quantity. Usually, it is performed in a manual way using a Neubauer chamber and expert criterion, with the risk of a high error rate. Scenedesmus algae can build coenobia consisting of 1, 2, 4 and 8 cells. ...