ICASSP is the world’s largest and most comprehensive technical conference focused on signal processing and its applications. The 2019 conference will feature world-class presentations by internationally renowned speakers, cutting-edge session topics and provide a fantastic opportunity to network with like-minded professionals from around the world. Visit website.
- Read more about A FORMAT-COMPLIANT SELECTIVE SECRET 3D OBJECT SHARING SCHEME BASED ON SHAMIR’S SCHEME
- Log in to post comments
New issues have arisen in the creation of 3D objects linked to collaboration in 3D workflows. In this kind of usage it may be necessary to allow access and to share a lower quality file of a 3D object for some collaborators.
In this paper, we present a Format-Compliant Selective Secret 3D Object Sharing (FCSS3DOS) scheme, which visually protects the content using geometrical distortions by selectively sharing bits of a 3D object's geometry using Shamir's Secret Sharing scheme.
- Categories:
- Read more about Deep Ptych: Subsampled Fourier Ptychography Using Deep Generative Priors
- Log in to post comments
This paper proposes a novel framework to regularize the highly illposed and non-linear Fourier ptychography problem using generative models. We demonstrate experimentally that our proposed algorithm, Deep Ptych, outperforms the existing Fourier ptychography techniques, in terms of quality of reconstruction and robustness against noise, using far fewer samples. We further modify the proposed approach to allow the generative model to explore solutions outside the range, leading to improved performance.
- Categories:
- Read more about REDUCED COMPLEXITY IMAGE CLUSTERING BASED ON CAMERA FINGERPRINTS
- Log in to post comments
This work presents a reduced complexity image clustering (RCIC) algorithm that blindly groups images based on their camera fingerprint. The algorithm does not need any prior information and can be implemented without and with attraction, to refine clusters. After a camera fingerprint is estimated for each image in the data set, a fingerprint is randomly selected as reference fingerprint and a cluster is constructed using this fingerprint as centroid. The clustered fingerprints are removed from the data set and the remaining fingerprints are clustered repeating the same process.
- Categories:
- Read more about AN ONLINE MULTIPLE-SPEAKER DOA TRACKING USING THE CAPPE-MOULINES RECURSIVE EXPECTATION-MAXIMIZATION ALGORITHM
- Log in to post comments
- Categories:
- Read more about Phylogenetic Analysis of Software Using Cache Miss Statistics
- Log in to post comments
While the phylogenetic analysis of multimedia documents keeps being investigated, some recent studies have shown the possibility of re-using the same strategies to analyze the evolution of computer programs (Software Phylogeny), considering its several applications spanning from copyright enforcement to malware detection.
- Categories:
- Read more about MIMO RADAR TRANSMIT BEAMPATTERN SYNTHESIS VIA WAVEFORM DESIGN FOR TARGET LOCALIZATION
- Log in to post comments
- Categories:
Despite significant advances in recent years, the problem of image stitching still lacks a robust solution. Most of the feature based image stitching algorithms perform image alignment based on either homography-based transformation or content-preserving warping. Pairwise homography-based approach miserably fails to handle parallax whereas content-preserving warping approach does not preserve the structural property of the images. In this paper, we propose a nonlinear optimization to find out the global homographies using pairwise homography estimates and point correspondences.
- Categories:
- Read more about CONTINUAL LEARNING FOR ANOMALY DETECTION WITH VARIATIONAL AUTOENCODER
- Log in to post comments
- Categories:
- Read more about DETECTION OF VOICE TRANSFORMATION SPOOFING BASED ON DENSE CONVOLUTIONAL NETWORK
- Log in to post comments
Nowadays, speech spoofing is so common that it presents a great challenge to social security. Thus, it is of great significance to recognize a spoofed speech from a genuine one. Most of the current researches have focused on voice conversion (VC), synthesis and recapture which mimic a target speaker to break through ASV systems by increased false acceptance rates. However, there exists another type of spoofing, voice transformation (VT), that transforms a speech signal without a target in order ‘not to be recognized’ by increased false reject rates. VT has received much less attention.
- Categories:
- Read more about RECONSTRUCTION-COGNIZANT GRAPH SAMPLING USING GERSHGORIN DISC ALIGNMENT
- Log in to post comments
- Categories: