SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Yogarajah Pratheepan) "

Sökning: WFRF:(Yogarajah Pratheepan)

  • Resultat 1-3 av 3
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Yogarajah, Pratheepan, et al. (författare)
  • A dynamic threshold approach for skin tone detection in colour images
  • 2012
  • Ingår i: International Journal of Biometrics (IJBM). - : InderScience Publishers. - 1755-8301 .- 1755-831X. ; 4:1, s. 38-55
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper presents a novel dynamic threshold approach to discriminate skin pixels and non-skin pixels in colour images. Fixed decision boundaries (or fixed threshold) classification approaches are successfully applied to detect human skin tone in colour images. These fixed thresholds mostly failed in two situations as they only search for a certain skin colour range: • any non-skin object may be classified as skin if non-skin objects's colour values belong to fixed threshold range • any true skin may be mistakenly classified as non-skin if the skin colour values do not belong to fixed threshold range. Therefore in this paper, instead of predefined fixed thresholds, novel online learned dynamic thresholds are used to overcome the above drawbacks. The experimental results show that our method is robust in overcoming these drawbacks. © 2012 Inderscience Enterprises Ltd.
  •  
2.
  • Yogarajah, Pratheepan, et al. (författare)
  • An Improved Self-embedding Algorithm : Digital Content Protection against Compression Attacks in Digital Watermarking
  • 2010
  • Ingår i: Image Processing and Communications Challenges 2. - Berlin, Heidelberg : Springer Berlin/Heidelberg. - 9783642162947 - 9783642162954 ; , s. 59-66
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Lossy compression attacks in digital watermarking are one of the major issues in digital watermarking. Cheddad et al. proposed a robust secured self-embedding method which is resistant to a certain amount of JPEG compression. Our experimental results show that the self-embedding method is resistant to JPEG compression attacks and not resistant to other lossy compression attacks such as Block Truncation Coding (BTC) and Singular Value Decomposition (SVD). Therefore we improved Cheddad et al's. method to give better protection against BTC and SVD compression attacks.
  •  
3.
  • Yogarajah, Pratheepan, et al. (författare)
  • Embed, track and authenticate images online with SDW-WebCrawler
  • 2011
  • Ingår i: 2011 Irish Machine Vision and Image Processing Conference. - : IEEE. - 9780769546292 - 9781467302302 ; , s. 76-81
  • Konferensbidrag (refereegranskat)abstract
    • The Internet is a widely open source to everyone to access Web pages. Using a web browser anyone can access websites. Because of this facility people can easily download images from websites without the owner's knowledge and use them in their own documents. Also image content may be modified for illegal purposes. Therefore a system is needed to authenticate images over the Web. Web image authentication is a challenging task that requires web crawlers to track and download images for authentication. Most of the known web image tracking engines such as TinEye and PicScout retrieve images according to the image infringement of the original image. However, these systems do not have the facility to authenticate the retrieved image, i.e. whether the retrieved image is similar to the original image or any image content alteration has occurred in the retrieved image and who is the copyrighted owner of the retrieved image.In order to solve the above mentioned drawbacks this paper presents a framework to protect image content, track it over the internet and authenticate the content. The proposed framework is based on self-embedding (i.e. where secret data and a binary version of the image are encrypted and embedded into the image), tracking (i.e. where a web crawler traverses over the internet to download images) and self-authentication (i.e. where the binary version of the hidden data is extracted to authenticate the image). Also another advantage of the proposed system is that it does not need the original image for the authentication process. 
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-3 av 3

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy