_ | invisible | _ |
3D Face Scanning Systems Based on | invisible | Infrared Coded Light |
3d Modelling the | invisible | Using Ground Penetrating Radar |
3D non-linear | invisible | boundary detection filters |
BadCM: | invisible | Backdoor Attack Against Cross-Modal Learning |
Baseline Detection and Localization for | invisible | Omnidirectional Cameras |
Blind | invisible | watermarking for 3D meshes with textures |
Blind | invisible | Watermarking Technique in DT-CWT Domain Using Visual Cryptography |
Can | invisible | Watermarks Resolve Rightful Ownerships? |
Catching the high altitude | invisible | by satellite-based forward scatter PCL |
Constrained Energy Maximization and Self-Referencing Method for | invisible | Ink Detection from Multispectral Historical Document Images |
Contrast Enhancement Using Novel White Balancing Parameter Optimization for Perceptually | invisible | Images |
Correlated and uncorrelated | invisible | temporal white noise alters mesopic rod signaling |
Counterfeiting Attacks on Oblivious Block-wise Independent | invisible | Watermarking Schemes |
Data Protection in Palmprint Recognition via Dynamic Random | invisible | Watermark Embedding |
Detecting | invisible | People |
Development of an | invisible | Human Experience System Using Diminished Reality |
Dynamic and | invisible | messaging for visual MIMO |
Embedding | invisible | Codes Into Normal Video Projection: Principle, Evaluation, and Applications |
Embedding | invisible | Information in Color Images |
Fuzzified Contrast Enhancement for Nearly | invisible | Images |
Generation of an Omnidirectional Video without | invisible | Areas Using Image Inpainting |
GIGAN: Self-supervised GAN for generating the | invisible | using cycle transformation and conditional normalization |
HCISNet: Higher-capacity | invisible | image steganographic network |
High-Capacity | invisible | Background Encoding for Digital Authentication of Hardcopy Documents |
Human De-occlusion: | invisible | Perception and Recovery for Humans |
Human-Centric Light Sensing and Estimation From RGBD Images: The | invisible | Light Switch |
Infrared | invisible | Clothing: Hiding from Infrared Detectors at Multiple Angles in Real World |
| invisible | Backdoor Attack with Sample-Specific Triggers |
| invisible | barcode with optimized error correction |
| invisible | Black-Box Backdoor Attack Through Frequency Domain, An |
| invisible | Calibration Pattern Based on Human Visual Perception Characteristics |
| invisible | Calibration Pattern for Print-and-Scan Data Hiding Based on Human Visual Perception |
| invisible | hybrid color image system using spread vector quantization neural networks with penalized FCM, An |
| invisible | light: Using infrared for video conference relighting |
| invisible | Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect |
| invisible | Semi-Fragile Watermarking and Steganography of Digital Videos for Content Authentication and Data Hiding |
| invisible | Watermarking Technique for Image Verification, An |
Learning | invisible | Markers for Hidden Codes in Offline-to-online Photography |
Learning to See the | invisible | : End-to-End Trainable Amodal Instance Segmentation |
Making the | invisible | Visible: Action Recognition Through Walls and Occlusions |
Making the | invisible | Visible: Strategies for Visualizing Underground Infrastructures in Immersive Environments |
Making the | invisible | Visible: Toward High-Quality Terahertz Tomographic Imaging via Physics-Guided Restoration |
Making the | invisible | Visible: Underwater Malta: A Virtual Museum for Submerged Cultural Heritage |
Multi-Sensor Multi-Target Tracking: Strategies for Events that become | invisible | |
Multi-View Clustering Based on | invisible | Weights |
On Learning the | invisible | in Photoacoustic Tomography with Flat Directionally Sensitive Detector |
On Resolving Rightful Ownerships of Digital Images by | invisible | Watermarks |
On the Invertibility of | invisible | Watermarking Techniques |
OPOM: Customized | invisible | Cloak Towards Face Privacy Protection |
Perceptual intra-frame coding for HEVC still picture profile based on | invisible | signal suppression |
Poison Ink: Robust and | invisible | Backdoor Attack |
Polarization-based Decorrelation of Transparent Layers: The Inclination Angle of an | invisible | Surface |
Protecting Publicly Available Images with an | invisible | Image Watermark |
Remotely Sensing the | invisible | -Thermal and Magnetic Survey Data Integration for Landscape Archaeology |
Revealing | invisible | Changes In The World |
Revealing the | invisible | With Model and Data Shrinking for Composite-Database Micro-Expression Recognition |
RIHOOP: Robust | invisible | Hyperlinks in Offline and Online Photographs |
Seeing | invisible | Poses: Estimating 3D Body Pose from Egocentric Video |
Seeing the | invisible | and Predicting the Unexpected |
Seeing the | invisible | : Survey of Video Motion Magnification and Small Motion Analysis |
SeGAN: Segmenting and Generating the | invisible | |
Segmentation with | invisible | Keying Signal |
Spectral Imaging Technique for Visualizing the | invisible | Information |
Statistical Inference of Motion in the | invisible | |
StegaNeRF: Embedding | invisible | Information within Neural Radiance Fields |
StegaStamp: | invisible | Hyperlinks in Physical Photographs |
Three-Dimensional Nonlinear | invisible | Boundary Detection |
To make yourself | invisible | with Adversarial Semantic Contours |
Tracking the | invisible | : Learning where the object might be |
Visiting the | invisible | : Layer-by-Layer Completed Scene Decomposition |
Visual Imaging of | invisible | Hazardous Substances Using Bacterial Inspiration |
Visualizing the | invisible | : Occluded Vehicle Segmentation and Recovery |
72 for invisible