A general method for sensitive identification detection in the terrorist video
Abstract
References
Index Terms
- A general method for sensitive identification detection in the terrorist video
Recommendations
A Complete Logo Detection/Recognition System for Document Images
SBES '13: Proceedings of the 2013 27th Brazilian Symposium on Software EngineeringIn this paper, a complete logo detection/ recognition system for document images is proposed. In the proposed system, first, a logo detection method is employed to detect a few regions of interest (logo-patches), which likely contain the logo(s), in a ...
An Erotic Image Recognition Method Based on Multi-source Information Fusion
MINES '13: Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and SecurityFor the demand of recognising erotic image, a new method of recognising erotic image based on multi-source information fusion is proposed. The method makes use of Gaussian skin model to implement the detection of naked skin area, combines the Hough ...
A unified approach to coding and interpreting face images
ICCV '95: Proceedings of the Fifth International Conference on Computer VisionFace images are difficult to interpret because they are highly variable. Sources of variability include individual appearance, 3D pose, facial expression and lighting. We describe a compact parametrised model of facial appearance which takes into ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Ramesh Jain,
- Shuqiang Jiang,
- Program Chairs:
- John Smith,
- Jitao Sang,
- Guohui Li
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 99Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in