-
1
-
-
0034446966
-
Image in-painting
-
Aug.
-
M. Bertalmio, G. Sapiro, V. Caselles, and C. Ballester, "Image in-painting," SIGGRAPH, pp. 417-424, Aug. 2000.
-
(2000)
SIGGRAPH
, pp. 417-424
-
-
Bertalmio, M.1
Sapiro, G.2
Caselles, V.3
Ballester, C.4
-
2
-
-
33646021969
-
Image completion with structure propagation
-
Aug.
-
J. Sun, L. Yuan, J. Jia, and H.-Y. Shum, "Image completion with structure propagation," SIGGRAPH, pp. 861-868, Aug. 2005.
-
(2005)
SIGGRAPH
, pp. 861-868
-
-
Sun, J.1
Yuan, L.2
Jia, J.3
Shum, H.-Y.4
-
3
-
-
1942453320
-
Virtual restoration of ancient Chinese paintings using color contrast enhancement and lacuna texture synthesis
-
Mar.
-
S.-C. Pei, Y.-C. Zeng, and C.-H. Chang, "Virtual restoration of ancient Chinese paintings using color contrast enhancement and lacuna texture synthesis," IEEE Trans. Image Process., vol. 13, no. 3, pp. 416-429, Mar. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.3
, pp. 416-429
-
-
Pei, S.-C.1
Zeng, Y.-C.2
Chang, C.-H.3
-
4
-
-
0742269025
-
Attacking visible watermarking schemes
-
Feb.
-
C.-H. Huang and J.-L. Wu, "Attacking visible watermarking schemes," IEEE Trans. Multimedia, vol. 6, no. 1, pp. 16-30, Feb. 2004.
-
(2004)
IEEE Trans. Multimedia
, vol.6
, Issue.1
, pp. 16-30
-
-
Huang, C.-H.1
Wu, J.-L.2
-
5
-
-
0029777872
-
Protecting publicly available images with a visible image watermark
-
Feb. 1-2
-
G. Braudaway, K. A. Magerlein, and F. Mintzer, "Protecting publicly available images with a visible image watermark," in Proc. SPIE, Int. Conf. Electronic Imaging, Feb. 1-2, 1996, vol. 2659, pp. 126-133.
-
(1996)
Proc. SPIE, Int. Conf. Electronic Imaging
, vol.2659
, pp. 126-133
-
-
Braudaway, G.1
Magerlein, K.A.2
Mintzer, F.3
-
6
-
-
0032319685
-
Embedding visible video watermarks in the compressed domain
-
Oct. 4-7
-
J. Meng and S.-F. Chang, "Embedding visible video watermarks in the compressed domain," in Proc. ICIP, Oct. 4-7, 1998, vol. 1, pp. 474-477.
-
(1998)
Proc. ICIP
, vol.1
, pp. 474-477
-
-
Meng, J.1
Chang, S.-F.2
-
7
-
-
85134053846
-
A dual watermarking technique for image
-
Oct/Nov.
-
S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli, "A dual watermarking technique for image," in Proc. 7th ACM Int. Multimedia Conf., Oct/Nov. 1999, vol. 2, pp. 49-51.
-
(1999)
Proc. 7th ACM Int. Multimedia Conf.
, vol.2
, pp. 49-51
-
-
Mohanty, S.P.1
Ramakrishnan, K.R.2
Kankanhalli, M.S.3
-
8
-
-
0034509511
-
A DCT domain visible watermarking technique for image
-
Jul./Aug.
-
S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli, "A DCT domain visible watermarking technique for image," in Proc. IEEE Int. Conf. Multimedia and Expo., Jul./Aug. 2000, vol. 2, pp. 1029-1032.
-
(2000)
Proc. IEEE Int. Conf. Multimedia and Expo.
, vol.2
, pp. 1029-1032
-
-
Mohanty, S.P.1
Ramakrishnan, K.R.2
Kankanhalli, M.S.3
-
9
-
-
0035959799
-
Wavelet domain adaptive visible watermarking
-
Sep.
-
Y. Hu and S. Kwong, "Wavelet domain adaptive visible watermarking," Electron. Lett., vol. 37, no. 20, pp. 1219-1220, Sep. 2001.
-
(2001)
Electron. Lett.
, vol.37
, Issue.20
, pp. 1219-1220
-
-
Hu, Y.1
Kwong, S.2
-
10
-
-
0010813216
-
A visible watermarking mechanism using a statistic approach
-
P.-M. Chen, "A visible watermarking mechanism using a statistic approach," in Proc. 5th Int. Conf. Signal Processing, 2000, vol. 2, pp. 910-913.
-
(2000)
Proc. 5th Int. Conf. Signal Processing
, vol.2
, pp. 910-913
-
-
Chen, P.-M.1
-
11
-
-
0027812550
-
Blind beamforming for non Gaussian signals
-
Dec.
-
J. F. Cardoso and A. Souloumiac, "Blind beamforming for non Gaussian signals," Proc. Inst. Elect. Eng. F, vol. 140, no. 6, pp. 362-370, Dec. 1993.
-
(1993)
Proc. Inst. Elect. Eng. F
, vol.140
, Issue.6
, pp. 362-370
-
-
Cardoso, J.F.1
Souloumiac, A.2
-
12
-
-
0042826822
-
Independent component analysis: Algorithms and applications
-
May/Jun.
-
A. Hyvarinen and E. Oja, "Independent component analysis: Algorithms and applications," Neural Netw., vol. 13, pp. 411-430, May/Jun. 2000.
-
(2000)
Neural Netw.
, vol.13
, pp. 411-430
-
-
Hyvarinen, A.1
Oja, E.2
-
13
-
-
0031078854
-
A blind source separation technique using second order statistics
-
Feb.
-
A. Belouchrani, K. Abed-Meraim, J. F. Cardoso, and E. Moulines, "A blind source separation technique using second order statistics," IEEE Trans. Signal Process., vol. 45, no. 2, pp. 434-444, Feb. 1997.
-
(1997)
IEEE Trans. Signal Process.
, vol.45
, Issue.2
, pp. 434-444
-
-
Belouchrani, A.1
Abed-Meraim, K.2
Cardoso, J.F.3
Moulines, E.4
-
14
-
-
33845675171
-
-
JADE Program. [Online]
-
JADE Program. [Online]. Available: http://sig.enst.fr/~cardoso/stuff. html.
-
-
-
-
15
-
-
33845655778
-
-
FastICA Program. [Online]
-
FastICA Program. [Online], Available: http://www.cis.hut.fi/projects/ica/ fastica/.
-
-
-
-
16
-
-
33845616516
-
-
SOBI Program. [Online]
-
SOBI Program. [Online]. Available: http://www.tsi.enst.fr/icacentral/ icalistArchive/2004/0727.html.
-
-
-
-
17
-
-
33845671527
-
-
[Online]
-
[Online]. Available: http://www.fvs.co.uk/fvshome/watermhelp.asp.
-
-
-
-
18
-
-
33845662487
-
-
[Online]
-
[Online]. Available: http://www.dlib.org/dlib/december97/ibm/12lot- spiech.html.
-
-
-
-
19
-
-
33845633082
-
-
[Online]
-
[Online]. Available: http://www.biblepicturegallery.com/.
-
-
-
-
20
-
-
33845676426
-
-
[Online]
-
[Online]. Available: http://www.blinkred.com/gallery/static/home. asp.
-
-
-
-
21
-
-
33845637029
-
-
[Online]
-
[Online]. Available: http://earthwindow.com/mola.html.
-
-
-
|