文件名称:image-processing
介绍说明--下载内容均来自于网络,请自行研究使用
this are all possible image processing papers
(系统自动生成,下载前可以参看下载内容)
下载文件列表
文件名 | 大小 | 更新时间 |
---|---|---|
| ||
image processing | ||
................\06274348.pdf | ||
................\1-s2.0-S0167865511003886-main.pdf | ||
................\11Iris Recognition Method Based on the Optimized.pdf | ||
................\2-Real-time face recognition demonstration..pdf | ||
................\222Iris segmentation for non-cooperative recognition.pdf | ||
................\44An Accurate and Easy Method towards Iris Localization.pdf | ||
................\A New Biometric-based User Authentication Scheme without using Password for.pdf | ||
................\A Novel Data Embedding Method Using Adaptive Pixel Pair Matching | ||
................\................................................................\A Novel Data Embedding Method Using Adaptive Pixel Pair Matching.docx | ||
................\A Probabilistic Model of (t | n) Visual Cryptography Scheme | |
................\.........................................................\A Probabilistic Model of (t | n) Visual Cryptography Scheme.docx | |
................\Active Visual Segmentation | ||
................\..........................\Active Visual Segmentation.docx | ||
................\Biometric Personal Identification Based on Iris-java.pdf | ||
................\cbir_using_iga-matlab.pdf | ||
................\ieeee-2012-image processing-java.pdf | ||
................\Image Segmentation Based on the Poincar?Map Method | ||
................\..................................................\Image Segmentation Based on the Poincar?Map Method.docx | ||
................\Improving Various Reversible Data Hiding Schemes Via Optimal Codes | ||
................\..................................................................\Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers.docx | ||
................\Iris Feature Extraction and Recognition Using.pdf | ||
................\K-N SECRET SHARING VISUAL CRYPTOGRAPHY | ||
................\......................................\K-N SECRET SHARING VISUAL CRYPTOGRAPHY.docx | ||
................\Multiple exposure fusion for high dynamic range image acquisition | ||
................\.................................................................\Multiple exposure fusion for high dynamic range image acquisition.docx | ||
................\Non-Orthogonal View Iris Recognition System.pdf | ||
................\Personal Identification from Iris Images Using Localized Radon Transform.pdf | ||
................\Scalable and Secure Sharing of Personal Health Records | ||
................\......................................................\Scalable and Secure Sharing of Personal Health Records.docx | ||
................\......................................................\scalableandsecuresharingofpersonalhealthrecordsincloudcomputingusingattribute-basedencryption.pdf | ||
................\Semisupervised Biased Maximum Margin Analysis | ||
................\.............................................\Semisupervised Biased Maximum Margin Analysis.docx | ||
................\View-invariant action recognition based on Artificial Neural Networks | ||
................\.....................................................................\View-invariant action recognition based on Artificial Neural Networks.docx |