10 research outputs found

    Conglomerates\u27 Goals -- And Their Attainments

    Get PDF

    Human age estimation framework using different facial parts

    Get PDF
    Human age estimation from facial images has a wide range of real-world applications in human computer interaction (HCI). In this paper, we use the bio-inspired features (BIF) to analyze different facial parts: (a) eye wrinkles, (b) whole internal face (without forehead area) and (c) whole face (with forehead area) using different feature shape points. The analysis shows that eye wrinkles which cover 30% of the facial area contain the most important aging features compared to internal face and whole face. Furthermore, more extensive experiments are made on FG-NET database by increasing the number of missing pictures in older age groups using MORPH database to enhance the results

    Efficient watermark detection by using the longest common substring technique

    Get PDF
    AbstractLarge scale of watermarking methods is available in the literature. These methods differ in visibility, capacity, and robustness. In watermarking, the robustness against attacks is the most challenging issue. The desynchronization attacks are the most serious problems facing the watermarking process. The traditional correlation methods fail in watermark detection. Until today there is no widely used algorithm for solving the desynchronization attacks. In this paper, we will introduce a new algorithm for solving the watermark desynchronization attacks. The watermark embedding and detection models are introduced. So, these models are related to the attacker model by presenting four attacking scenarios. We show the effect of each attack scenario on bit rate, signal distortion, and robustness. We conclude that, the attacker could not distort a big part of the watermark. So, we suggest using a probabilistic embedding model combined with the longest common substring technique. This combination is efficient in solving the desynchronization attacks. Results show that, the proposed algorithm is powerful against the attacking scenarios. Moreover, the watermark is still be detected even if only 5% of the watermark is recovered

    Fusion in Multimodal Biometric System: A Review

    No full text
    corecore