Gray Cerebrovascular Image Skeleton Extraction Algorithm Using Level Set Model
暂无分享,去创建一个
Zhiming Cui | Jie Xia | Jian Wu | Guangming Zhang | Zhiming Cui | Jian Wu | Guangming Zhang | Jie Xia
[1] Christer Ericson,et al. Real-Time Collision Detection , 2004 .
[2] Raymond N. J. Veldhuis,et al. On the accuracy of EERs in face recognition and the importance of reliable registration , 2005 .
[3] Mie Sato,et al. Penalized-Distance Volumetric Skeleton Algorithm , 2001, IEEE Trans. Vis. Comput. Graph..
[4] H.-P. Seidel,et al. Realtime Ray Tracing on GPU with BVH-based Packet Traversal , 2007, 2007 IEEE Symposium on Interactive Ray Tracing.
[5] Te-Ming Tu,et al. Robust spatial watermarking technique for colour images via direct saturation adjustment , 2005 .
[6] Paul A. Viola,et al. Robust Real-time Object Detection , 2001 .
[7] Guy Demoment,et al. Image reconstruction and restoration: overview of common estimation structures and problems , 1989, IEEE Trans. Acoust. Speech Signal Process..
[8] Cordelia Schmid,et al. Indexing Based on Scale Invariant Interest Points , 2001, ICCV.
[9] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[10] J. E. Fowler,et al. The redundant discrete wavelet transform and additive noise , 2005, IEEE Signal Processing Letters.
[11] Xu Xiao. The Algorithm of Descriptor Based on Locality Preserving Projections , 2008 .
[12] Qiang Ji,et al. Automatic Eye Detection and Its Validation , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.
[13] R. S. Ledley,et al. Fundamentals of true-color image processing , 1990, [1990] Proceedings. 10th International Conference on Pattern Recognition.
[14] Mohammed Bennamoun,et al. The use of mutual information for rigid medical image registration: a review , 2002, IEEE International Conference on Systems, Man and Cybernetics.
[15] Te-Ming Tu,et al. Starmarker- : a fast and robust RGB-based saturation watermarking system for pan-sharpened IKONOS and QuickBird imagery , 2006 .
[16] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[17] Pat Hanrahan,et al. Rendering complex scenes with memory-coherent ray tracing , 1997, SIGGRAPH.
[18] Kaleem Siddiqi,et al. Flux driven fly throughs , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..
[19] Ja-Ling Wu,et al. Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..
[20] Tan Junshan. Research on Digital Image Encryption Based on Composite Chaotic System , 2006 .
[21] Ingo Wald,et al. Ray tracing deformable scenes using dynamic bounding volume hierarchies , 2007, TOGS.
[22] Weixue Lu,et al. Multicriterion maximum entropy image reconstruction from projections , 1992, IEEE Trans. Medical Imaging.
[23] Mario Bertero,et al. The Stability of Inverse Problems , 1980 .
[24] Nasir D. Memon,et al. Steganalysis based on image quality metrics , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[25] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[26] Turner Whitted,et al. An improved illumination model for shaded display , 1979, CACM.
[27] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[28] Erkki Oja,et al. Independent component analysis: algorithms and applications , 2000, Neural Networks.
[29] Liao Yun-tao. Correlation tracking using a novel distance measurement as feedback , 2003 .
[30] Andrew Zisserman,et al. Regression and classification approaches to eye localization in face images , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[31] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[32] Thai Duy Hien,et al. RDWT/ICA for image authentication , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[33] Thai Duy Hien,et al. Robust RDWT-ICA based information hiding , 2006, Soft Comput..
[34] Markus Wagner,et al. Interactive Rendering with Coherent Ray Tracing , 2001, Comput. Graph. Forum.
[35] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[36] Narges Ahmidi,et al. A novel DCT-based approach for secure color image watermarking , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[37] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[38] Jaejin Lee,et al. Authentication and correction of digital watermarking images , 1999 .
[39] Cordelia Schmid,et al. Local Grayvalue Invariants for Image Retrieval , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[40] B. Logan. The uncertainty principle in reconstructing functions from projections , 1975 .
[41] Tao Zhang,et al. A new approach to reliable detection of LSB steganography in natural images , 2003, Signal Process..
[42] Sushil K. Bhattacharjee,et al. Towards second generation watermarking schemes , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[43] Klaus J. Kirchberg,et al. Robust Face Detection Using the Hausdorff Distance , 2001, AVBPA.
[44] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[45] Wen Gao,et al. Image matching based on a local invariant descriptor , 2005, IEEE International Conference on Image Processing 2005.
[46] Pavel Pudil,et al. Introduction to Statistical Pattern Recognition , 2006 .
[47] Jan Kautz,et al. Packet-based whitted and distribution ray tracing , 2007, GI '07.
[48] James E. Fowler,et al. RDWT and Image Watermarking , 2001 .
[49] Zhang Hong,et al. Tamper Detection and Self Recovery of Images Using Self-Embedding , 2004 .
[50] Timothy F. Cootes,et al. A comparison of shape constrained facial feature detectors , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..
[51] I. Wald,et al. On fast Construction of SAH-based Bounding Volume Hierarchies , 2007, 2007 IEEE Symposium on Interactive Ray Tracing.
[52] F. Natterer,et al. Mathematical problems of computerized tomography , 1983, Proceedings of the IEEE.
[53] Yi Shi,et al. Embedding image watermarks in dc components , 2000, IEEE Trans. Circuits Syst. Video Technol..
[54] Seongjai Kim,et al. An O(N) Level Set Method for Eikonal Equations , 2000, SIAM J. Sci. Comput..
[55] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[56] S. Popov,et al. Experiences with Streaming Construction of SAH KD-Trees , 2006, 2006 IEEE Symposium on Interactive Ray Tracing.
[57] Vivek K. Goyal,et al. Quantized Overcomplete Expansions in IRN: Analysis, Synthesis, and Algorithms , 1998, IEEE Trans. Inf. Theory.
[58] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[59] Patrick J. Flynn,et al. Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[60] Daniel P. Huttenlocher,et al. Comparing Images Using the Hausdorff Distance , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[61] Tomás Pevný,et al. Towards Multi-class Blind Steganalyzer for JPEG Images , 2005, IWDW.
[62] W.R. Mark,et al. Large ray packets for real-time Whitted ray tracing , 2008, 2008 IEEE Symposium on Interactive Ray Tracing.
[63] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[64] Asker M. Bazen,et al. Likelihood Ratio-Based Detection of Facial Features , 2003 .
[65] Wang Meihua,et al. Novel copyright protection scheme for digital content , 2006 .
[66] Nasir D. Memon,et al. Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.
[67] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[68] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[69] Faouzi Kossentini,et al. JasPer: a software-based JPEG-2000 codec implementation , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[70] C.M. Kung,et al. Visual Robust Oblivious Watermarking Technique Using Error Correcting Code , 2006, 2006 International Conference on Communication Technology.
[71] C.M. Kung,et al. A Robust Watermarking and Image Authentication Technique on Block Property , 2008, 2008 International Symposium on Information Science and Engineering.
[72] Alexander Reshetov,et al. Faster Ray Packets - Triangle Intersection through Vertex Culling , 2007, 2007 IEEE Symposium on Interactive Ray Tracing.
[73] H.C. Ferreira,et al. Watermarking for JPEG image using error correction coding , 2004, 2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590).
[74] Tim Foley,et al. KD-tree acceleration structures for a GPU raytracer , 2005, HWWS '05.
[75] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[76] G. Clark,et al. Reference , 2008 .
[77] E. Mansson,et al. Deep Coherent Ray Tracing , 2007, 2007 IEEE Symposium on Interactive Ray Tracing.
[78] Sun Kang,et al. Variable characteristics based blind detection of hidden information , 2007 .
[79] Clark F. Olson. Maximum-Likelihood Image Matching , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[80] Dinesh Manocha,et al. Interactive collision detection between deformable models using chromatic decomposition , 2005, SIGGRAPH 2005.
[81] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[82] S. Boulos,et al. Getting rid of packets - Efficient SIMD single-ray traversal using multi-branching BVHs - , 2008, 2008 IEEE Symposium on Interactive Ray Tracing.
[83] Jessica Fridrich,et al. Determining the stego algorithm for JPEG images , 2006 .
[84] Laurent D. Cohen,et al. Global Minimum for Active Contour Models: A Minimal Path Approach , 1997, International Journal of Computer Vision.
[85] Andrew Kensler,et al. SIMD Ray Stream Tracing - SIMD Ray Traversal with Generalized Ray Packets and On-the-fly Re-Ordering - , 2007 .
[86] Raymond N. J. Veldhuis,et al. A MAP approach to landmarking , 2007 .
[87] Arthur W. Toga,et al. Efficient Skeletonization of Volumetric Objects , 1999, IEEE Trans. Vis. Comput. Graph..
[88] Tomás Pevný,et al. Multi-class blind steganalysis for JPEG images , 2006, Electronic Imaging.
[89] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[90] Alexander Keller,et al. Instant ray tracing: the bounding interval hierarchy , 2006, EGSR '06.
[91] Jaejin Lee,et al. A watermarking sequence using parities of error control coding for image authentication and correction , 2000, IEEE Trans. Consumer Electron..
[92] Erik Lindholm,et al. NVIDIA Tesla: A Unified Graphics and Computing Architecture , 2008, IEEE Micro.
[93] Jean-Jacques Quisquater,et al. Cryptology for digital TV broadcasting , 1995, Proc. IEEE.
[94] Timothy F. Cootes,et al. Facial feature detection and tracking with automatic template selection , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[95] Raymond N. J. Veldhuis,et al. A landmark paper in face recognition , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[96] A. Reshetov. Omnidirectional Ray Tracing Traversal Algorithm for kd-trees , 2006, 2006 IEEE Symposium on Interactive Ray Tracing.
[97] Dan Yu,et al. A New Blind Watermarking Technique Based on Independent Component Analysis , 2002, IWDW.
[98] Paola Campadelli,et al. Precise Eye Localization through a General-to-specific Model Definition , 2006, BMVC.
[99] S.G. Parker,et al. Design for Parallel Interactive Ray Tracing Systems , 2006, 2006 IEEE Symposium on Interactive Ray Tracing.
[100] Timothy F. Cootes,et al. A Multi-Stage Approach to Facial Feature Detection , 2004, BMVC.
[101] Luc Van Gool,et al. Wide Baseline Stereo Matching based on Local, Affinely Invariant Regions , 2000, BMVC.
[102] Eckhard Koch,et al. Copyright Protection for Multimedia Data , 1994 .
[103] Alexander Keller,et al. Shallow Bounding Volume Hierarchies for Fast SIMD Ray Tracing of Incoherent Rays , 2008, Comput. Graph. Forum.
[104] Yongdong Wu,et al. Tamper-Localization Watermarking with Systematic Error Correcting Code , 2006, 2006 International Conference on Image Processing.
[105] Stanislaw Osowski,et al. Robust PCA neural networks for random noise reduction of the data , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[106] Aleksandra Pizurica,et al. Noise Removal from Images by Projecting onto Bases of Principal Components , 2007, ACIVS.
[107] R. Fisher. THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .
[108] Hongxia Wang,et al. Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes , 2006 .
[109] Aniruddha Sinha,et al. Pattern based robust digital watermarking scheme for images , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[110] Pat Hanrahan,et al. Interactive k-d tree GPU raytracing , 2007, SI3D.
[111] Minerva M. Yeung,et al. Invisible watermarking for image verification , 1998, J. Electronic Imaging.
[112] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[113] Qian Tao,et al. Face verification for mobile personal devices , 2009 .
[114] William A. Pearlman,et al. Fast additive noise steganalysis , 2004, IS&T/SPIE Electronic Imaging.
[115] Pat Hanrahan,et al. Ray tracing on a connection machine , 1988, ICS '88.
[116] Thomas W. Parks,et al. Adaptive principal components and image denoising , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[117] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[118] John C. Hart,et al. The ray engine , 2002, HWWS '02.
[119] Russell M. Mersereau,et al. An oblivious robust digital watermark technique for still images using DCT phase modulation , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[120] J. Fridrich,et al. Attacking the OutGuess , 2002 .
[121] Aly A. Farag,et al. On the Extraction of Curve Skeletons using Gradient Vector Flow , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[122] Laurent D. Cohen,et al. Fast extraction of minimal paths in 3D images and applications to virtual endoscopy , 2001, Medical Image Anal..
[123] Christopher G. Harris,et al. A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.
[124] Yuan Mei Wang,et al. Multicriterion image reconstruction and implementation , 1989, Comput. Vis. Graph. Image Process..