TY - CONF
T1 - Face verification using large feature sets and one shot similarity
T2 - Biometrics (IJCB), 2011 International Joint Conference on
Y1 - 2011
A1 - Guo,Huimin
A1 - Robson Schwartz,W.
A1 - Davis, Larry S.
KW - analysis;set
KW - approximations;regression
KW - descriptor;labeled
KW - Face
KW - feature
KW - in
KW - information;face
KW - information;texture
KW - least
KW - LFW;PLS;PLS
KW - recognition;least
KW - regression;color
KW - sets;one
KW - shot
KW - similarity;partial
KW - squares
KW - squares;shape
KW - the
KW - theory;
KW - verification;facial
KW - wild;large
AB - We present a method for face verification that combines Partial Least Squares (PLS) and the One-Shot similarity model[28]. First, a large feature set combining shape, texture and color information is used to describe a face. Then PLS is applied to reduce the dimensionality of the feature set with multi-channel feature weighting. This provides a discriminative facial descriptor. PLS regression is used to compute the similarity score of an image pair by One-Shot learning. Given two feature vector representing face images, the One-Shot algorithm learns discriminative models exclusively for the vectors being compared. A small set of unlabeled images, not containing images belonging to the people being compared, is used as a reference (negative) set. The approach is evaluated on the Labeled Face in the Wild (LFW) benchmark and shows very comparable results to the state-of-the-art methods (achieving 86.12% classification accuracy) while maintaining simplicity and good generalization ability.
JA - Biometrics (IJCB), 2011 International Joint Conference on
M3 - 10.1109/IJCB.2011.6117498
ER -
TY - JOUR
T1 - Nonlinear Resonant and Chaotic Dynamics in Microwave Assisted Magnetization Switching
JF - Magnetics, IEEE Transactions on
Y1 - 2009
A1 - d'Aquino,M.
A1 - Serpico,C.
A1 - Bertotti,G.
A1 - Mayergoyz, Issak D
A1 - Bonin,R.
KW - amplitude;chaotic
KW - components;magnetic
KW - dynamical
KW - dynamics;coercive
KW - dynamics;numerical
KW - field
KW - field;coercivity;linearly-polarized
KW - force;magnetic
KW - magnetization
KW - nanoparticle;microwave-assisted
KW - particles;magnetic
KW - radiofrequency
KW - resonant
KW - RF
KW - simulations;perturbation
KW - switching;nanoparticles;nonlinear
KW - switching;nonlinear
KW - systems;perturbation
KW - technique;chaos;coercive
KW - theory;
AB - The switching process of a uniformly magnetized magnetic nanoparticle is considered. The particle is subject to applied fields having both dc and linearly-polarized radio-frequency (RF) components. The possibility of using the RF power to obtain a reduced coercivity of the particle is related to the onset of chaotic magnetization dynamics for moderately low values of the RF field amplitude. Perturbation technique for the evaluation of the reduced coercive field is developed and applied to the microwave assisted switching of the particle. Numerical simulations confirm the predictions of the theory.
VL - 45
SN - 0018-9464
CP - 10
M3 - 10.1109/TMAG.2009.2023242
ER -
TY - JOUR
T1 - Robust and secure image hashing
JF - Information Forensics and Security, IEEE Transactions on
Y1 - 2006
A1 - Swaminathan,A.
A1 - Mao,Yinian
A1 - M. Wu
KW - content-preserving
KW - cryptography;
KW - differential
KW - distortions;
KW - entropy;
KW - Filtering
KW - Fourier
KW - functions;
KW - hash
KW - hashing;
KW - image
KW - modifications;
KW - processing;
KW - secure
KW - theory;
KW - transform;
KW - transforms;
AB - Image hash functions find extensive applications in content authentication, database search, and watermarking. This paper develops a novel algorithm for generating an image hash based on Fourier transform features and controlled randomization. We formulate the robustness of image hashing as a hypothesis testing problem and evaluate the performance under various image processing operations. We show that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions. We introduce a general framework to study and evaluate the security of image hashing systems. Under this new framework, we model the hash values as random variables and quantify its uncertainty in terms of differential entropy. Using this security framework, we analyze the security of the proposed schemes and several existing representative methods for image hashing. We then examine the security versus robustness tradeoff and show that the proposed hashing methods can provide excellent security and robustness.
VL - 1
SN - 1556-6013
CP - 2
M3 - 10.1109/TIFS.2006.873601
ER -
TY - CONF
T1 - An algebraic approach to surface reconstruction from gradient fields
T2 - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on
Y1 - 2005
A1 - Agrawal,A.
A1 - Chellapa, Rama
A1 - Raskar, R.
KW - algebra;
KW - algebraic
KW - approach;
KW - Computer
KW - confinement;
KW - discrete
KW - domain
KW - error
KW - field;
KW - from
KW - gradient
KW - graph
KW - image
KW - integrability;
KW - linear
KW - local
KW - methods;
KW - photometric
KW - reconstruction;
KW - shading;
KW - SHAPE
KW - stereo;
KW - surface
KW - system;
KW - theory;
KW - vision;
AB - Several important problems in computer vision such as shape from shading (SFS) and photometric stereo (PS) require reconstructing a surface from an estimated gradient field, which is usually non-integrable, i.e. have non-zero curl. We propose a purely algebraic approach to enforce integrability in discrete domain. We first show that enforcing integrability can be formulated as solving a single linear system Ax =b over the image. In general, this system is under-determined. We show conditions under which the system can be solved and a method to get to those conditions based on graph theory. The proposed approach is non-iterative, has the important property of local error confinement and can be applied to several problems. Results on SFS and PS demonstrate the applicability of our method.
JA - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on
VL - 1
M3 - 10.1109/ICCV.2005.31
ER -
TY - CONF
T1 - Approximate expressions for the mean and the covariance of the maximum likelihood estimator for acoustic source localization
T2 - Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on
Y1 - 2005
A1 - Raykar,V.C.
A1 - Duraiswami, Ramani
KW - (mathematics);
KW - acoustic
KW - approximate
KW - approximation
KW - array
KW - array;
KW - covariance
KW - estimation;
KW - expansion;
KW - expressions;
KW - function;
KW - likelihood
KW - localization;
KW - matrices;
KW - matrix;
KW - maximum
KW - mean
KW - microphone
KW - objective
KW - processing;
KW - series
KW - signal
KW - source
KW - Taylor
KW - theory;
KW - vector;
KW - vectors;
AB - Acoustic source localization using multiple microphones can be formulated as a maximum likelihood estimation problem. The estimator is implicitly defined as the minimum of a certain objective function. As a result, we cannot get explicit expressions for the mean and the covariance of the estimator. We derive approximate expressions for the mean vector and covariance matrix of the estimator using Taylor's series expansion of the implicitly defined estimator. The validity of our expressions is verified by Monte-Carlo simulations. We also study the performance of the estimator for different microphone array configurations.
JA - Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on
VL - 3
M3 - 10.1109/ICASSP.2005.1415649
ER -
TY - CONF
T1 - Detecting rotational symmetries
T2 - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on
Y1 - 2005
A1 - Shiv Naga Prasad,V.
A1 - Davis, Larry S.
KW - axial
KW - computational
KW - detection;
KW - field;
KW - flow;
KW - geometry;
KW - gradient
KW - graph
KW - graph;
KW - image
KW - image;
KW - magnitude
KW - methods;
KW - multiple
KW - n-sided
KW - object
KW - polygons;
KW - recognition;
KW - rotational
KW - symmetries;
KW - symmetry;
KW - theory;
KW - tire
KW - tyres;
KW - vector
AB - We present an algorithm for detecting multiple rotational symmetries in natural images. Given an image, its gradient magnitude field is computed, and information from the gradients is spread using a diffusion process in the form of a gradient vector flow (GVF) field. We construct a graph whose nodes correspond to pixels in tire image, connecting points that are likely to be rotated versions of one another The n-cycles present in tire graph are made to vote for C_{n} symmetries, their votes being weighted by the errors in transformation between GVF in the neighborhood of the voting points, and the irregularity of the n-sided polygons formed by the voters. The votes are accumulated at tire centroids of possible rotational symmetries, generating a confidence map for each order of symmetry. We tested the method with several natural images.
JA - Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on
VL - 2
M3 - 10.1109/ICCV.2005.71
ER -
TY - CONF
T1 - Measurement-based multipath multicast
T2 - INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE
Y1 - 2005
A1 - Guven,T.
A1 - La,R.J.
A1 - Shayman,M.A.
A1 - Bhattacharjee, Bobby
KW - algorithm;
KW - allocation;
KW - application-layer
KW - approximation
KW - approximation;
KW - balance
KW - communication;
KW - Convergence
KW - convergence;
KW - intradomain
KW - load
KW - measurement-based
KW - methods;
KW - Multicast
KW - multipath
KW - network
KW - numerical
KW - of
KW - overlaying;
KW - perturbation
KW - processes;
KW - resource
KW - Routing
KW - routing;
KW - source;
KW - Stochastic
KW - techniques;
KW - Telecommunication
KW - theory;
KW - traffic;
AB - We propose a measurement-based routing algorithm to load balance intradomain traffic along multiple paths for multiple multicast sources. Multiple paths are established using application-layer overlaying. The proposed algorithm is able to converge under different network models, where each model reflects a different set of assumptions about the multicasting capabilities of the network. The algorithm is derived from simultaneous perturbation stochastic approximation and relies only on noisy estimates from measurements. Simulation results are presented to demonstrate the additional benefits obtained by incrementally increasing the multicasting capabilities.
JA - INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE
VL - 4
M3 - 10.1109/INFCOM.2005.1498566
ER -
TY - CONF
T1 - Dynamic distortion control for 3-D embedded wavelet video over multiuser OFDM networks
T2 - Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE
Y1 - 2004
A1 - Su,Guan-Ming
A1 - Han,Zhu
A1 - M. Wu
A1 - Liu,K. J.R
KW - 3D
KW - 802.11a;
KW - channels;
KW - codec;
KW - codecs;
KW - communication;
KW - control;
KW - deviation;
KW - distortion
KW - diversity
KW - diversity;
KW - downlink
KW - dynamic
KW - embedded
KW - fairness;
KW - Frequency
KW - IEEE
KW - LAN;
KW - maximal
KW - minimax
KW - minimization;
KW - modulation;
KW - multimedia
KW - multiuser
KW - OFDM
KW - OFDM;
KW - PSNR
KW - rate
KW - reception;
KW - streaming;
KW - systems;
KW - techniques;
KW - theory;
KW - TIME
KW - transforms;
KW - video
KW - video;
KW - wavelet
KW - wireless
AB - In this paper, we propose a system to transmit multiple 3D embedded wavelet video programs over downlink multiuser OFDM. We consider the fairness among users and formulate the problem as minimizing the users' maximal distortion subject to power, rate, and subcarrier constraints. By exploring frequency, time, and multiuser diversity in OFDM and flexibility of the 3D embedded wavelet video codec, the proposed algorithm can achieve fair video qualities among all users. Compared to a scheme similar to the current multiuser OFDM standard (IEEE 802.11a), the proposed scheme outperforms it by 1-5 dB on the worst received PSNR among all users and has much smaller PSNR deviation.
JA - Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE
VL - 2
M3 - 10.1109/GLOCOM.2004.1378042
ER -
TY - CONF
T1 - Image hashing resilient to geometric and filtering operations
T2 - Multimedia Signal Processing, 2004 IEEE 6th Workshop on
Y1 - 2004
A1 - Swaminathan,A.
A1 - Mao,Yinian
A1 - M. Wu
KW - compact
KW - cryptographic
KW - cryptography;
KW - discrete
KW - distortion;
KW - Filtering
KW - Fourier
KW - function;
KW - geometric
KW - hash
KW - image
KW - key
KW - key;
KW - operation;
KW - polar
KW - PROCESSING
KW - public
KW - representation;
KW - theory;
KW - transform;
KW - transforms;
AB - Image hash functions provide compact representations of images, which is useful for search and authentication applications. In this work, we have identified a general three step framework and proposed a new image hashing scheme that achieves a better overall performance than the existing approaches under various kinds of image processing distortions. By exploiting the properties of discrete polar Fourier transform and incorporating cryptographic keys, the proposed image hash is resilient to geometric and filtering operations, and is secure against guessing and forgery attacks.
JA - Multimedia Signal Processing, 2004 IEEE 6th Workshop on
M3 - 10.1109/MMSP.2004.1436566
ER -
TY - CONF
T1 - Iterative figure-ground discrimination
T2 - Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on
Y1 - 2004
A1 - Zhao, L.
A1 - Davis, Larry S.
KW - algorithm;
KW - analysis;
KW - Bandwidth
KW - calculation;
KW - Color
KW - colour
KW - Computer
KW - density
KW - dimensional
KW - discrimination;
KW - distribution;
KW - distributions;
KW - Estimation
KW - estimation;
KW - expectation
KW - figure
KW - Gaussian
KW - ground
KW - image
KW - initialization;
KW - iterative
KW - Kernel
KW - low
KW - methods;
KW - mixture;
KW - model
KW - model;
KW - nonparametric
KW - parameter
KW - parametric
KW - processes;
KW - sampling
KW - sampling;
KW - segmentation
KW - segmentation;
KW - statistics;
KW - theory;
KW - vision;
AB - Figure-ground discrimination is an important problem in computer vision. Previous work usually assumes that the color distribution of the figure can be described by a low dimensional parametric model such as a mixture of Gaussians. However, such approach has difficulty selecting the number of mixture components and is sensitive to the initialization of the model parameters. In this paper, we employ non-parametric kernel estimation for color distributions of both the figure and background. We derive an iterative sampling-expectation (SE) algorithm for estimating the color, distribution and segmentation. There are several advantages of kernel-density estimation. First, it enables automatic selection of weights of different cues based on the bandwidth calculation from the image itself. Second, it does not require model parameter initialization and estimation. The experimental results on images of cluttered scenes demonstrate the effectiveness of the proposed algorithm.
JA - Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on
VL - 1
M3 - 10.1109/ICPR.2004.1334006
ER -
TY - CONF
T1 - Trust-preserving set operations
T2 - INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies
Y1 - 2004
A1 - Morselli,R.
A1 - Bhattacharjee, Bobby
A1 - Katz, Jonathan
A1 - Keleher,P.
KW - accumulator;
KW - Bloom
KW - computing;
KW - filter;
KW - mechanism;
KW - network;
KW - operation;
KW - peer-to-peer
KW - RSA
KW - Security
KW - security;
KW - set
KW - system-wide
KW - Telecommunication
KW - theory;
KW - trust-preserving
AB - We describe a method for performing trust-preserving set operations by untrusted parties. Our motivation for this is the problem of securely reusing content-based search results in peer-to-peer networks. We model search results and indexes as data sets. Such sets have value for answering a new query only if they are trusted. In the absence of any system-wide security mechanism, a data set is trusted by a node a only if it was generated by some node which is trusted by a. Our main contributions are a formal definition of the problem as well as an efficient scheme that solves this problem by allowing untrusted peers to perform set operations on trusted data sets while also producing unforgeable proofs of correctness. This is accomplished by requiring trusted nodes to sign appropriately-defined digests of generated sets; each such digest consists of an RSA accumulator and a Bloom filter. The scheme is general, and has other applications as well. We give an analysis demonstrating the low overhead of the scheme, and we include experimental data which confirm the analysis.
JA - INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies
VL - 4
M3 - 10.1109/INFCOM.2004.1354646
ER -
TY - CONF
T1 - Window-based, discontinuity preserving stereo
T2 - Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on
Y1 - 2004
A1 - Agrawal,M.
A1 - Davis, Larry S.
KW - algorithm;
KW - approach;
KW - based
KW - cuts;
KW - dense
KW - discontinuity
KW - global
KW - graph
KW - image
KW - local
KW - MATCHING
KW - matching;
KW - minimisation;
KW - optimization;
KW - Pixel
KW - preserving
KW - processing;
KW - stereo
KW - theory;
KW - window
AB - Traditionally, the problem of stereo matching has been addressed either by a local window-based approach or a dense pixel-based approach using global optimization. In this paper we present an algorithm which combines window-based local matching into a global optimization framework. Our local matching algorithm assumes that local windows can have at most two disparities. Under this assumption, the local matching can be performed very efficiently using graph cuts. The global matching is formulated as minimization of an energy term that takes into account the matching constraints induced by the local stereo algorithm. Fast, approximate minimization of this energy is achieved through graph cuts. The key feature of our algorithm is that it preserves discontinuities both during the local as well as global matching phase.
JA - Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on
VL - 1
M3 - 10.1109/CVPR.2004.1315015
ER -
TY - CONF
T1 - A 2D profile reconstruction in a multilayered waveguide structure
T2 - Antennas and Propagation Society International Symposium, 2003. IEEE
Y1 - 2003
A1 - Seydou,F.
A1 - Duraiswami, Ramani
A1 - Seppanen,T.
KW - (mathematics);
KW - 2D
KW - dual
KW - duality
KW - electromagnetic
KW - equations;
KW - inhomogeneous
KW - Maxwell
KW - media;
KW - method;
KW - multilayered
KW - multilayers;
KW - profile
KW - reconstruction;
KW - scattering;
KW - space
KW - structure;
KW - theory;
KW - wave
KW - waveguide
KW - waveguides;
AB - We discuss the problem of finding a profile or its location for a 2D scattering of electromagnetic waves with fixed frequencies in a waveguide multilayered domain. We use the dual space method (DSM) of Colton and Monk. Our goal is to extend our previous work of TE and TM cases to the more complicated case of a waveguide. We emphasize on the frequency range in the reconstruction.
JA - Antennas and Propagation Society International Symposium, 2003. IEEE
VL - 1
M3 - 10.1109/APS.2003.1217513
ER -
TY - CONF
T1 - Adaptive visual tracking and recognition using particle filters
T2 - Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on
Y1 - 2003
A1 - Zhou,Shaohua
A1 - Chellapa, Rama
A1 - Moghaddam, B.
KW - adaptive
KW - adaptive-velocity
KW - appearance
KW - extra-personal
KW - Filtering
KW - filters;
KW - image
KW - intra-personal
KW - model;
KW - MOTION
KW - particle
KW - processing;
KW - recognition;
KW - sequence;
KW - sequences;
KW - series
KW - signal
KW - spaces;
KW - theory;
KW - TIME
KW - tracking;
KW - video
KW - visual
AB - This paper presents an improved method for simultaneous tracking and recognition of human faces from video, where a time series model is used to resolve the uncertainties in tracking and recognition. The improvements mainly arise from three aspects: (i) modeling the inter-frame appearance changes within the video sequence using an adaptive appearance model and an adaptive-velocity motion model; (ii) modeling the appearance changes between the video frames and gallery images by constructing intra- and extra-personal spaces; and (iii) utilization of the fact that the gallery images are in frontal views. By embedding them in a particle filter, we are able to achieve a stabilized tracker and an accurate recognizer when confronted by pose and illumination variations.
JA - Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on
VL - 2
M3 - 10.1109/ICME.2003.1221625
ER -
TY - JOUR
T1 - Anti-collusion fingerprinting for multimedia
JF - Signal Processing, IEEE Transactions on
Y1 - 2003
A1 - Trappe,W.
A1 - M. Wu
A1 - Wang,Z.J.
A1 - Liu,K. J.R
KW - (mathematics);
KW - additive
KW - algorithm;
KW - and
KW - anti-collusion
KW - attack;
KW - averaging
KW - binary
KW - code
KW - codes;
KW - codevectors;
KW - coding;
KW - colluders
KW - collusion;
KW - combinatorial
KW - communication;
KW - compression;
KW - correlation;
KW - cost-effective
KW - data
KW - data;
KW - design
KW - DETECTION
KW - detection;
KW - digital
KW - embedding;
KW - fingerprinting;
KW - Gaussian
KW - identification;
KW - image
KW - images;
KW - keying;
KW - logical
KW - mathematics;
KW - Modulation
KW - modulation;
KW - multimedia
KW - multimedia;
KW - of
KW - on-off
KW - operation;
KW - orthogonal
KW - processes;
KW - real
KW - redistribution;
KW - Security
KW - signal
KW - signals;
KW - theory;
KW - tree-structured
KW - TREES
KW - watermarking;
AB - Digital fingerprinting is a technique for identifying users who use multimedia content for unintended purposes, such as redistribution. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cost-effective attack against such digital fingerprints is collusion, where several differently marked copies of the same content are combined to disrupt the underlying fingerprints. We investigate the problem of designing fingerprints that can withstand collusion and allow for the identification of colluders. We begin by introducing the collusion problem for additive embedding. We then study the effect that averaging collusion has on orthogonal modulation. We introduce a tree-structured detection algorithm for identifying the fingerprints associated with K colluders that requires O(Klog(n/K)) correlations for a group of n users. We next develop a fingerprinting scheme based on code modulation that does not require as many basis signals as orthogonal modulation. We propose a new class of codes, called anti-collusion codes (ACCs), which have the property that the composition of any subset of K or fewer codevectors is unique. Using this property, we can therefore identify groups of K or fewer colluders. We present a construction of binary-valued ACC under the logical AND operation that uses the theory of combinatorial designs and is suitable for both the on-off keying and antipodal form of binary code modulation. In order to accommodate n users, our code construction requires only O( radic;n) orthogonal signals for a given number of colluders. We introduce three different detection strategies that can be used with our ACC for identifying a suspect set of colluders. We demonstrate the performance of our ACC for fingerprinting multimedia and identifying colluders through experiments using Gaussian signals and real images.
VL - 51
SN - 1053-587X
CP - 4
M3 - 10.1109/TSP.2003.809378
ER -
TY - CONF
T1 - Electromagnetic scattering from a multilayered cylindrical waveguide
T2 - Antennas and Propagation Society International Symposium, 2003. IEEE
Y1 - 2003
A1 - Seydou,F.
A1 - Duraiswami, Ramani
A1 - Seppanen,T.
KW - circular
KW - core;
KW - cylinder;
KW - cylindrical
KW - dielectric
KW - dielectric-loaded
KW - electromagnetic
KW - EM
KW - equations;
KW - matching;
KW - Maxwell
KW - mode
KW - multilayered
KW - scattering;
KW - theory;
KW - wave
KW - waveguide
KW - waveguide;
KW - waveguides;
AB - This paper is devoted to electromagnetic scattering from an N multilayered circular cylinder. We consider waveguides in the z direction; that is, we look for the solution of Maxwell equations along the z direction. We assume a dielectric core and derive a mode matching approach for solving the problem. A numerical result is presented that illustrates the algorithm.
JA - Antennas and Propagation Society International Symposium, 2003. IEEE
VL - 3
M3 - 10.1109/APS.2003.1219855
ER -
TY - CONF
T1 - Improved fast gauss transform and efficient kernel density estimation
T2 - Computer Vision, 2003. Proceedings. Ninth IEEE International Conference on
Y1 - 2003
A1 - Yang,C.
A1 - Duraiswami, Ramani
A1 - Gumerov, Nail A.
A1 - Davis, Larry S.
KW - adaptive
KW - algorithm;multivariate
KW - complexity;computer
KW - complexity;Gaussian
KW - computational
KW - density
KW - estimation;mean
KW - expansion
KW - Gauss
KW - processes;computational
KW - recognition;quadratic
KW - scheme;pattern
KW - shift
KW - space
KW - subdivision
KW - technique;computer
KW - theory;
KW - transform;kernel
KW - vision;estimation
KW - vision;fast
AB - Evaluating sums of multivariate Gaussians is a common computational task in computer vision and pattern recognition, including in the general and powerful kernel density estimation technique. The quadratic computational complexity of the summation is a significant barrier to the scalability of this algorithm to practical applications. The fast Gauss transform (FGT) has successfully accelerated the kernel density estimation to linear running time for low-dimensional problems. Unfortunately, the cost of a direct extension of the FGT to higher-dimensional problems grows exponentially with dimension, making it impractical for dimensions above 3. We develop an improved fast Gauss transform to efficiently estimate sums of Gaussians in higher dimensions, where a new multivariate expansion scheme and an adaptive space subdivision technique dramatically improve the performance. The improved FGT has been applied to the mean shift algorithm achieving linear computational complexity. Experimental results demonstrate the efficiency and effectiveness of our algorithm.
JA - Computer Vision, 2003. Proceedings. Ninth IEEE International Conference on
M3 - 10.1109/ICCV.2003.1238383
ER -
TY - CONF
T1 - Integral equation solution of electromagnetic scattering from a multilayered cylindrical waveguide
T2 - Antennas and Propagation Society International Symposium, 2003. IEEE
Y1 - 2003
A1 - Seydou,F.
A1 - Duraiswami, Ramani
A1 - Seppanen,T.
KW - approximation
KW - circular
KW - core;
KW - cylinder;
KW - cylindrical
KW - dielectric
KW - dielectric-loaded
KW - electromagnetic
KW - EM
KW - equations;
KW - integral
KW - Maxwell
KW - method;
KW - multilayered
KW - numerical
KW - Nystrom
KW - scattering;
KW - theory;
KW - wave
KW - waveguide
KW - waveguides;
AB - This paper is devoted to the electromagnetic scattering from an N multilayered cylinder. We consider waveguides in the z direction, that is: we look for the solution of Maxwell equations along the z direction. We assume a dielectric core and discuss the problem for the case of general domains. We use an integral equation approach to solve the problem and the Nystrom method for the numerical approximation.
JA - Antennas and Propagation Society International Symposium, 2003. IEEE
VL - 3
M3 - 10.1109/APS.2003.1219901
ER -
TY - CONF
T1 - Shape and motion driven particle filtering for human body tracking
T2 - Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on
Y1 - 2003
A1 - Yamamoto, T.
A1 - Chellapa, Rama
KW - 3D
KW - body
KW - broadcast
KW - camera;
KW - cameras;
KW - estimation;
KW - Filtering
KW - framework;
KW - human
KW - image
KW - MOTION
KW - motion;
KW - particle
KW - processing;
KW - rotational
KW - sequence;
KW - sequences;
KW - signal
KW - single
KW - static
KW - theory;
KW - tracking;
KW - TV
KW - video
AB - In this paper, we propose a method to recover 3D human body motion from a video acquired by a single static camera. In order to estimate the complex state distribution of a human body, we adopt the particle filtering framework. We present the human body using several layers of representation and compose the whole body step by step. In this way, more effective particles are generated and ineffective particles are removed as we process each layer. In order to deal with the rotational motion, the frequency of rotation is obtained using a preprocessing operation. In the preprocessing step, the variance of the motion field at each image is computed, and the frequency of rotation is estimated. The estimated frequency is used for the state update in the algorithm. We successfully track the movement of figure skaters in TV broadcast image sequence, and recover the 3D shape and motion of the skater.
JA - Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on
VL - 3
M3 - 10.1109/ICME.2003.1221248
ER -
TY - CONF
T1 - Statistical shape theory for activity modeling
T2 - Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on
Y1 - 2003
A1 - Vaswani, N.
A1 - Chowdhury, A.R.
A1 - Chellapa, Rama
KW - abnormal
KW - activities
KW - activity
KW - analysis;
KW - behavior;
KW - classification;
KW - data;
KW - image
KW - mass;
KW - matching;
KW - modeling;
KW - monitoring;
KW - moving
KW - normal
KW - particle;
KW - pattern
KW - pattern;
KW - point
KW - polygonal
KW - probability;
KW - problem;
KW - processing;
KW - sequence;
KW - sequences;
KW - SHAPE
KW - shape;
KW - signal
KW - statistical
KW - Surveillance
KW - surveillance;
KW - theory;
KW - video
AB - Monitoring activities in a certain region from video data is an important surveillance problem. The goal is to learn the pattern of normal activities and detect unusual ones by identifying activities that deviate appreciably from the typical ones. We propose an approach using statistical shape theory based on the shape model of D.G. Kendall et al. (see "Shape and Shape Theory", John Wiley and Sons, 1999). In a low resolution video, each moving object is best represented as a moving point mass or particle. In this case, an activity can be defined by the interactions of all or some of these moving particles over time. We model this configuration of the particles by a polygonal shape formed from the locations of the points in a frame and the activity by the deformation of the polygons in time. These parameters are learned for each typical activity. Given a test video sequence, an activity is classified as abnormal if the probability for the sequence (represented by the mean shape and the dynamics of the deviations), given the model, is below a certain threshold The approach gives very encouraging results in surveillance applications using a single camera and is able to identify various kinds of abnormal behavior.
JA - Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on
VL - 3
M3 - 10.1109/ICASSP.2003.1199519
ER -
TY - JOUR
T1 - Temporal probabilistic object bases
JF - Knowledge and Data Engineering, IEEE Transactions on
Y1 - 2003
A1 - Biazzo,V.
A1 - Giugno,R.
A1 - Lukasiewicz,T.
A1 - V.S. Subrahmanian
KW - algebra;
KW - algebraic
KW - bases;
KW - constraints;
KW - data
KW - database
KW - database;
KW - databases;
KW - distribution
KW - explicit
KW - functions;
KW - handling;
KW - implicit
KW - instances;
KW - integrity;
KW - intervals;
KW - management;
KW - model;
KW - models;
KW - object
KW - object-oriented
KW - operations;
KW - probabilistic
KW - probability
KW - probability;
KW - relational
KW - temporal
KW - theory;
KW - Uncertainty
KW - uncertainty;
AB - There are numerous applications where we have to deal with temporal uncertainty associated with objects. The ability to automatically store and manipulate time, probabilities, and objects is important. We propose a data model and algebra for temporal probabilistic object bases (TPOBs), which allows us to specify the probability with which an event occurs at a given time point. In explicit TPOB-instances, the sets of time points along with their probability intervals are explicitly enumerated. In implicit TPOB-instances, sets of time points are expressed by constraints and their probability intervals by probability distribution functions. Thus, implicit object base instances are succinct representations of explicit ones; they allow for an efficient implementation of algebraic operations, while their explicit counterparts make defining algebraic operations easy. We extend the relational algebra to both explicit and implicit instances and prove that the operations on implicit instances correctly implement their counterpart on explicit instances.
VL - 15
SN - 1041-4347
CP - 4
M3 - 10.1109/TKDE.2003.1209009
ER -
TY - CONF
T1 - Content-based image retrieval using Fourier descriptors on a logo database
T2 - Pattern Recognition, 2002. Proceedings. 16th International Conference on
Y1 - 2002
A1 - Folkers,A.
A1 - Samet, Hanan
KW - abstraction;
KW - analysis;
KW - constraints;
KW - content-based
KW - contour
KW - database
KW - database;
KW - databases;
KW - descriptors;
KW - detection;
KW - edge
KW - Fourier
KW - image
KW - logos;
KW - pictorial
KW - processing;
KW - query
KW - retrieval;
KW - SHAPE
KW - spatial
KW - specification;
KW - theory;
KW - visual
AB - A system that enables the pictorial specification of queries in an image database is described. The queries are comprised of rectangle, polygon, ellipse, and B-spline shapes. The queries specify which shapes should appear in the target image as well as spatial constraints on the distance between them and their relative position. The retrieval process makes use of an abstraction of the contour of the shape which is invariant against translation, scale, rotation, and starting point, that is based on the use of Fourier descriptors. These abstractions are used in a system to locate logos in an image database. The utility of this approach is illustrated using some sample queries.
JA - Pattern Recognition, 2002. Proceedings. 16th International Conference on
VL - 3
M3 - 10.1109/ICPR.2002.1047991
ER -
TY - JOUR
T1 - Optimal edge-based shape detection
JF - Image Processing, IEEE Transactions on
Y1 - 2002
A1 - Moon, H.
A1 - Chellapa, Rama
A1 - Rosenfeld, A.
KW - 1D
KW - 2D
KW - aerial
KW - analysis;
KW - boundary
KW - conditions;
KW - contour
KW - cross
KW - detection;
KW - DODE
KW - double
KW - edge
KW - edge-based
KW - error
KW - error;
KW - exponential
KW - extraction;
KW - facial
KW - feature
KW - filter
KW - filter;
KW - Filtering
KW - function;
KW - geometry;
KW - global
KW - human
KW - images;
KW - imaging
KW - localization
KW - mean
KW - methods;
KW - NOISE
KW - operator;
KW - optimal
KW - optimisation;
KW - output;
KW - performance;
KW - pixel;
KW - power;
KW - propagation;
KW - properties;
KW - section;
KW - SHAPE
KW - square
KW - squared
KW - statistical
KW - step
KW - theory;
KW - tracking;
KW - two-dimensional
KW - vehicle
KW - video;
AB - We propose an approach to accurately detecting two-dimensional (2-D) shapes. The cross section of the shape boundary is modeled as a step function. We first derive a one-dimensional (1-D) optimal step edge operator, which minimizes both the noise power and the mean squared error between the input and the filter output. This operator is found to be the derivative of the double exponential (DODE) function, originally derived by Ben-Arie and Rao (1994). We define an operator for shape detection by extending the DODE filter along the shape's boundary contour. The responses are accumulated at the centroid of the operator to estimate the likelihood of the presence of the given shape. This method of detecting a shape is in fact a natural extension of the task of edge detection at the pixel level to the problem of global contour detection. This simple filtering scheme also provides a tool for a systematic analysis of edge-based shape detection. We investigate how the error is propagated by the shape geometry. We have found that, under general assumptions, the operator is locally linear at the peak of the response. We compute the expected shape of the response and derive some of its statistical properties. This enables us to predict both its localization and detection performance and adjust its parameters according to imaging conditions and given performance specifications. Applications to the problem of vehicle detection in aerial images, human facial feature detection, and contour tracking in video are presented.
VL - 11
SN - 1057-7149
CP - 11
M3 - 10.1109/TIP.2002.800896
ER -
TY - CONF
T1 - Page classification through logical labelling
T2 - Pattern Recognition, 2002. Proceedings. 16th International Conference on
Y1 - 2002
A1 - Liang,Jian
A1 - David Doermann
A1 - Ma,M.
A1 - Guo,J. K
KW - article
KW - attributed
KW - base;
KW - character
KW - classification;
KW - constraints;
KW - document
KW - document;
KW - experimental
KW - global
KW - graph
KW - graph;
KW - hierarchical
KW - image
KW - images;
KW - labelling;
KW - logical
KW - model
KW - noise;
KW - OCR;
KW - optical
KW - page
KW - pages;
KW - processing;
KW - recognition;
KW - relational
KW - results;
KW - technical
KW - theory;
KW - title
KW - unknown
AB - We propose an integrated approach to page classification and logical labelling. Layout is represented by a fully connected attributed relational graph that is matched to the graph of an unknown document, achieving classification and labelling simultaneously. By incorporating global constraints in an integrated fashion, ambiguity at the zone level can be reduced, providing robustness to noise and variation. Models are automatically trained from sample documents. Experimental results show promise for the classification and labelling of technical article title pages, and supports the idea of a hierarchical model base.
JA - Pattern Recognition, 2002. Proceedings. 16th International Conference on
VL - 3
M3 - 10.1109/ICPR.2002.1047980
ER -
TY - CONF
T1 - OCR-based rate-distortion analysis of residual coding
T2 - Image Processing, 1997. Proceedings., International Conference on
Y1 - 1997
A1 - Kia,O. E
A1 - David Doermann
KW - analysis;redundancy;representative
KW - character
KW - coding;distortion
KW - coding;image
KW - coding;lossy
KW - coding;row-order
KW - coding;symbolic
KW - compression;data
KW - compression;document
KW - compression;lossy
KW - database
KW - distortion
KW - Evaluation
KW - image
KW - images;document
KW - images;experiments;ground
KW - measure;document
KW - OCR
KW - of
KW - performance;University
KW - processing;distance-order
KW - processing;image
KW - prototypes;residual
KW - recognition;rate
KW - representation;optical
KW - representation;progressive
KW - software;OCR
KW - system
KW - theory;
KW - transmission;rate-distortion
KW - truth;image
KW - Washington;compressed-domain
AB - Symbolic compression of document images provides access to symbols found in document images and exploits the redundancy found within them. Document images are highly structured and contain large numbers of repetitive symbols. We have shown that while symbolically compressing a document image we are able to perform compressed-domain processing. Symbolic compression forms representative prototypes for symbols and encode the image by the location of these prototypes and a residual (the difference between symbol and prototype). We analyze the rate-distortion tradeoff by varying the amount of residual used in compression for both distance- and row-order coding. A measure of distortion is based on the performance of an OCR system on the resulting image. The University of Washington document database images, ground truth, and OCR evaluation software are used for experiments
JA - Image Processing, 1997. Proceedings., International Conference on
VL - 3
M3 - 10.1109/ICIP.1997.632215
ER -
TY - CONF
T1 - Space/time trade-offs for associative memory
T2 - Pattern Recognition, 1996., Proceedings of the 13th International Conference on
Y1 - 1996
A1 - GROVE,A. J
A1 - Jacobs, David W.
KW - access
KW - matching;set
KW - memory;associative
KW - nets;pattern
KW - processing;content-addressable
KW - query;memory
KW - recall;membership
KW - scheme;associative
KW - space;set
KW - storage;neural
KW - theory;
KW - theory;storage
KW - time;associative
AB - In any storage scheme, there is some trade-off between the space used (size of memory) and access time. However, the nature of this trade-off seems to depend on more than just what is being stored-it also depends the types of queries we consider. We justify this claim by considering a particular memory model and contrast recognition (membership queries) with associative recall. We show that the latter task can require exponentially larger memories even when identical information is stored
JA - Pattern Recognition, 1996., Proceedings of the 13th International Conference on
VL - 4
M3 - 10.1109/ICPR.1996.547434
ER -
TY - CONF
T1 - Efficient minimum cost matching using quadrangle inequality
T2 - Foundations of Computer Science, 1992. Proceedings., 33rd Annual Symposium on
Y1 - 1992
A1 - Aggarwal,A.
A1 - Bar-Noy,A.
A1 - Khuller, Samir
A1 - Kravets,D.
A1 - Schieber,B.
KW - algorithm;
KW - array;
KW - bipartite
KW - bitonic
KW - blue
KW - complexity;
KW - computational
KW - cost
KW - distance;
KW - Euclidean
KW - function;
KW - geometry;
KW - graph
KW - graphs;
KW - inequality;
KW - linear
KW - MATCHING
KW - matching;
KW - minimisation;
KW - minimum
KW - Monge
KW - perfect
KW - points;
KW - polynomial
KW - problem;
KW - quadrangle
KW - red
KW - theory;
KW - TIME
KW - transportation
KW - transportation;
KW - weakly
AB - The authors present efficient algorithms for finding a minimum cost perfect matching, and for solving the transportation problem in bipartite graphs, G = (Red cup; Blue, Red times; Blue), where |Red| = n, |Blue| = m, n les; m, and the cost function obeys the quadrangle inequality. The first results assume that all the red points and all the blue points lie on a curve that is homeomorphic to either a line or a circle and the cost function is given by the Euclidean distance along the curve. They present a linear time algorithm for the matching problem. They generalize the method to solve the corresponding transportation problem in O((m+n)log(m+n)) time. The next result is an O(n log m) algorithm for minimum cost matching when the cost array is a bitonic Monge array. An example of this is when the red points lie on one straight line and the blue points lie on another straight line (that is not necessarily parallel to the first one). Finally, they provide a weakly polynomial algorithm for the transportation problem in which the associated cost array is a bitonic Monge array
JA - Foundations of Computer Science, 1992. Proceedings., 33rd Annual Symposium on
M3 - 10.1109/SFCS.1992.267793
ER -
TY - JOUR
T1 - A new approach to realizing partially symmetric functions
JF - Computers, IEEE Transactions on
Y1 - 1989
A1 - JaJa, Joseph F.
A1 - Wu,S.-M.
KW - class
KW - complexity;logic
KW - cover;symmetric
KW - covers;switching
KW - design;switching
KW - functions;Boolean
KW - functions;complexity;partially
KW - functions;computational
KW - functions;sum-of-product
KW - of
KW - symmetric
KW - theory;
KW - theory;symmetric
AB - Consideration is given to the class of partially symmetric functions and a method for realizing them is outlined. Each such function can be expressed as a sum of totally symmetric functions such that a circuit can be designed with its complexity dependent on the size of such symmetric cover. The authors compare the sizes of symmetric and sum-of-product covers and show that the symmetric cover will be substantially smaller for this class of functions
VL - 38
SN - 0018-9340
CP - 6
M3 - 10.1109/12.24302
ER -