This comprehensive reference addresses the fundamental problems associated with gait and face-based human recognition, using color and infrared video data acquired from a distance. Both model-free and model-based approaches to gait-based human recognition are examined, including new techniques.
This practical guide provides a comprehensive overview of Euclidean structure and motion recovery, with a specific focus on factorization-based algorithms. The text discusses the latest research in the field and presents new algorithms developed by the authors.
This detailed overview of Arabic character recognition technology covers pre-processing and feature extraction; HMM-based methods; evaluation of OCR systems; and applications of recognition technology, from historical manuscripts to online Arabic recognition.
Practical in approach, this book describes a range of common imaging techniques, reconstruction techniques and image artifacts, reviews image enhancement methods, discusses image transfer and archiving, and includes exercises and a glossary of abbreviations.
Self-contained, accessible, and mathematically precise, this book serves as an introduction to the field of 3-D digital image processing, providing information that can be used immediately in practical algorithms for the analysis of 3-D data sets.
This revised and updated edition presents the computational and mathematical procedures underlying data collection, image reconstruction, and image display in computerized tomography. New topics include fast calculation of a ray sum in a digitized image and the task-oriented comparison of reconstruction algorithm performance.
Authored by Google research director Dr. Edward Chang, this book has the inside track on a fast-moving sector. Covering knowledge representation, semantic analysis, and scalability issues in one volume it is a must-read for both professionals and students.
Opening with a detailed review of techniques for selective encryption, this book examines algorithms that combine encryption and compression. Presents a selection of specific examples of the design and implementation of secure embedded multimedia systems.
This book brings together a wealth of experiences from leading researchers in the field of Embedded Computer vision, from both academic and industrial research labs. It also looks ahead, providing a sense of what applications can be expected in the future.