Acknowledgements: This work is supported by the National Natural Science Foundation of China (Nos. 60832010, 60671064, 60703011); the Chinese National 863 Program (No. 2007AA0 IZ- 458); the research fund for the Doctoral Program of Higher Education (No. RFDP20070213047).
Supported by the National Natural Science Foundation of China(60671064);the Foundation for the Author of National Excellent Doctoral Dissertation of China(FANEDD-200238);the Foundation for the Excellent Youth of Heilongjiang Province;the Program for New Century Excellent Talents in University(NCET-04-0330)
Fisherfaces algorithm is a popular method for face recognition.However,there exist some unstable com- ponents that degrade recognition performance.In this paper,we propose a method based on detecting reliable com- pon...
European Network of Excellence for cryptology, the National Natural Science Foundation of China(60671064);the Foundation for the Author of National Excellent Doctoral Dissertation of China (FANEDD-200238);the Foundation for the ExcellentYouth of Heilongjiang Province;the Program for New Century Excellent Talents in University (NCET-04-0330)
Numerous perceptual hashing algorithms have been developed for identification and verification of multimedia objects in recent years. Many application schemes have been adopted for various commercial objects. Develope...