![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Expanded Adaptive Scaling Normalization for End to End Image Compression
Recently, learning-based image compression methods that utilize convolutional neural layers have been developed rapidly. Rescaling modules such as batch normalization which are often used in convolutional neur...
-
Chapter and Conference Paper
SPSN: Superpixel Prototype Sampling Network for RGB-D Salient Object Detection
RGB-D salient object detection (SOD) has been in the spotlight recently because it is an important preprocessing operation for various vision tasks. However, despite advances in deep learning-based methods, RG...
-
Chapter and Conference Paper
Learning Temporally Invariant and Localizable Features via Data Augmentation for Video Recognition
Deep-Learning-based video recognition has shown promising improvements along with the development of large-scale datasets and spatiotemporal network architectures. In image recognition, learning spatially inva...
-
Chapter and Conference Paper
Automatic Pose-Normalized 3D Face Modeling and Recognition Systems
Pose-variation factors present a big problem in 2D face recognition. To solve this problem, we designed a 3D face acquisition system which was able to generate multi-view images. However, this created another ...
-
Chapter and Conference Paper
Rapid 3D Face Data Acquisition Using a Color-Coded Pattern and a Stereo Camera System
This paper presents a rapid 3D face data acquisition method that uses a color-coded pattern and a stereo camera system. The technique works by projecting a color coded pattern on an object and capturing two im...
-
Chapter and Conference Paper
3D Face Recognition Based on Facial Shape Indexes with Dynamic Programming
This paper describes a 3D face recognition method using facial shape indexes. Given an unknown range image, we extract invariant facial features based on the facial geometry. We estimate the 3D head pose using...
-
Chapter and Conference Paper
Invertible Watermarking Algorithm with Detecting Locations of Malicious Manipulation for Biometric Image Authentication
In this paper, we present a new method for authentication of biometric images. Our method uses an invertible watermark that can also detect malicious manipulations simultaneously. While virtually all watermark...