_ | move | _ |
Accurate and robust localization of duplicated region in copy- | move | image forgery |
Adaptive and | move | Making Auxiliary Cuts for Binary Pairwise Energies |
Adaptive Copy- | move | Forgery Detection Using Wavelet Coefficients Multiscale Decay, An |
Adaptive neuro-fuzzy inference system based on-the- | move | terrain classification for autonomous wheeled mobile robots |
Another | move | Toward the Minimum Consistent Subset: A Tabu Search Approach to the Condensed Nearest Neighbor Rule |
Automatic Detection of Internal Copy- | move | Forgeries in Images |
Autoregressive-Elephant Herding Optimization based Generative Adversarial Network for copy- | move | forgery detection with Interval type-2 fuzzy clustering |
Behavior Knowledge Space-Based Fusion for Copy- | move | Forgery Detection |
Blur-invariant copy- | move | forgery detection technique with improved detection accuracy utilising SWT-SVD |
brain in the machine: MIT is building robots that use full-body teleoperation to | move | with greater agility, The |
BusterNet: Detecting Copy- | move | Image Forgery with Source/Target Localization |
Chain code lossless compression using | move | -to-front transform and adaptive run-length encoding |
Chess | move | tracking using overhead RGB webcam |
Click to | move | : Controlling Video Generation with Sparse Motion |
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy- | move | Forgery Detection |
CMFD: a detailed review of block based and key feature based techniques in image copy- | move | forgery detection |
CMID: A New Dataset for Copy- | move | Forgeries on ID Documents |
CNN-Transformer Based Generative Adversarial Network for Copy- | move | Source/ Target Distinguishment |
Composite attacks-based copy- | move | image forgery detection using AKAZE and FAST with automatic contrast thresholding |
Continuous 3D Label Stereo Matching Using Local Expansion | move | s |
Continuous Markov Random Field Optimization Using Fusion | move | Driven Markov Chain Monte Carlo Technique |
Contraction | move | s for Geometric Model Fitting |
Copy | move | Forgery detection and localisation robust to rotation using block based Discrete Cosine Transform and eigenvalues |
Copy | move | Forgery Detection based on double matching |
Copy | move | forgery detection with similar but genuine objects |
Copy- | move | Detection Algorithm Using Binary Gradient Contours, A |
Copy- | move | forgery detection and localization by means of robust clustering with J-Linkage |
Copy- | move | forgery detection based on multi-radius PCET |
Copy- | move | forgery detection based on PatchMatch |
Copy- | move | Forgery Detection Based on SVD in Digital Image |
Copy- | move | Forgery Detection Using Color Space and Moment Invariants-Based Features |
Copy- | move | Forgery Detection Using the Segment Gradient Orientation Histogram |
Copy- | move | image forgery detection based on Gabor magnitude |
Copy- | move | Tamper Detection, Forensics |
Copy- | move | tampering detection using affine transformation property preservation on clustered keypoints |
Counter-forensics of SIFT-based copy- | move | detection by means of keypoint classification |
Countering Anti-forensics of SIFT-based Copy- | move | Detection |
COVERAGE: A novel database for copy- | move | forgery detection |
Deep Learning Feature Extraction Using Attention-Based DenseNet 121 for Copy | move | Forgery Detection |
Dependence on the display methods of change in accommodation and convergence when a target | move | s along the depth direction |
Detection of Copy- | move | Forgery in Flat Region Based on Feature Enhancement |
Digital Image Forensics Technique for Copy- | move | Forgery Detection Using DoG and ORB |
Discovering Objects that Can | move | |
Discriminating the Original Region from the Duplicated in Copy- | move | Forgery |
DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy- | move | Forgery Detection and Localization |
Dual branch convolutional neural network for copy | move | forgery detection |
Effective and efficient pixel-level detection for diverse video copy- | move | forgery types |
efficient copy | move | forgery detection using adaptive watershed segmentation with AGSO and hybrid feature extraction, An |
Efficient Fusion | move | Algorithm for the Minimum Cost Lifted Multicut Problem, An |
efficient ward-based copy- | move | forgery detection method for digital image forensic, An |
Embodied Amodal Recognition: Learning to | move | to Perceive Objects |
Enhanced Matching Method for Copy- | move | Forgery Detection by Means of Zernike Moments |
Extending continuous cuts: Anisotropic metrics and expansion | move | s |
Fast and effective Keypoint-based image copy- | move | forgery detection using complex-valued moment invariants |
Fast copy- | move | forgery detection using local bidirectional coherency error refinement |
Fast Fusion | move | s for Multi-Model Estimation |
Fast Plain Copy- | move | Detection Algorithm Based on Structural Pattern and 2D Rabin-Karp Rolling Hash, A |
Fast Solver for Truncated-Convex Priors: Quantized-Convex Split | move | s, A |
Focus-score weighted super-resolution for uncooperative iris recognition at a distance and on the | move | |
Fusion | move | s for correlation clustering |
Fusion | move | s for Graph Matching |
Fusion | move | s for Markov Random Field Optimization |
Fuzzy Metaheuristic Algorithm for Copy- | move | Forgery Detection in Image |
Generalized Fusion | move | s for Continuous Label Optimization |
Going deeper into copy- | move | forgery detection: Exploring image telltales via multi-scale analysis and voting processes |
GPS Trajectory Biometrics: From Where You Were to How You | move | |
GRMA: Generalized Range | move | Algorithms for the Efficient Optimization of MRFs |
High performance | move | s recognition and sequence segmentation based on key poses filtering |
Higher-order gradient descent by fusion- | move | graph cut |
How Did the Camera | move | ? |
How Do Deepfakes | move | ? Motion Magnification for Deepfake Source Detection |
How They | move | Reveals What Is Happening: Understanding the Dynamics of Big Events from Human Mobility Pattern |
Human-Inspired Haptic-Enabled Learning From Prehensile | move | Demonstrations |
Hyper-Graphs Inference through Convex Relaxations and | move | Making Algorithms: Contributions and Applications in Artificial Vision |
I- | move | : Independent Moving Objects for Velocity Estimation |
Identification and analysis of motives for eco-friendly driving within the eco- | move | project |
Image copy- | move | forgery detection algorithm based on ORB and novel similarity metric |
Image copy- | move | forgery detection based on dynamic threshold with dense points |
Image Copy- | move | Forgery Detection Using Combination of Scale-Invariant Feature Transform and Local Binary Pattern Features |
Image copy- | move | forgery detection using sparse recovery and keypoint matching |
Image Copy- | move | Forgery Detection via an End-to-End Deep Neural Network |
Improved DSIFT Descriptor Based Copy-Rotate- | move | Forgery Detection |
improved method for SIFT-based copy- | move | forgery detection using non-maximum value suppression and optimized J-Linkage, An |
Integer Circles, Etc.: Three | move | extension of Bresenham's algorithm |
Introduction to the Special Issue on the Recognition of Visible Wavelength Iris Images Captured At-a-distance and On-the- | move | |
Introduction to the Special Issue on the Segmentation of Visible Wavelength Iris Images Captured At-a-distance and On-the- | move | |
Iris on the | move | : Acquisition of Images for Iris Recognition in Less Constrained Environments |
Iris Recognition: A Method to Segment Visible Wavelength Iris Images Acquired On-the- | move | and At-a-Distance |
JPEG compression model in copy- | move | forgery detection |
Keypoint based comprehensive copy- | move | forgery detection |
Keypoints based enhanced multiple copy- | move | forgeries detection system using density-based spatial clustering of application with noise clustering algorithm |
Learn to | move | : Activity Specific Motion Models for Tracking by Detection |
Learning Features by Watching Objects | move | |
Machine Vision | move | s into Traffic: Part I |
Machine Vision | move | s into Traffic: Part II |
Machine Vision | move | s into Traffic: Part III |
Make It | move | : Controllable Image-to-Video Generation with Text Descriptions |
Making the right | move | s: Guiding alpha-expansion using local primal-dual gaps |
MAP-Inference on Large Scale Higher-Order Discrete Graphical Models by Fusion | move | s |
Motion Capture | move | s into New Realms |
| move | and remove: Multi-task learning for building simplification in vector maps with a graph convolutional neural network |
| move | Forward and Tell: A Progressive Generator of Video Descriptions |
| move | , Attend and Predict: An attention-based neural model for people's movement prediction |
| move | -Based Algorithms for the Optimization of an Isotropic Gradient MRF Model |
| move | S: Manipulated Objects in Video Enable Segmentation |
Multi-camera multi-object tracking on the | move | via single-stage global association approach |
Multi-Camera Multiple 3D Object Tracking on the | move | for Autonomous Vehicles |
Multi-label | move | s for MRFs with Truncated Convex Priors |
Multi-View 3D Estimation and Applications to Match | move | |
Multilabel partition | move | s for MRF optimization |
Mumford-Shah on the | move | : Region-Based Segmentation on Deforming Manifolds with Application to 3-D Reconstruction of Shape and Appearance from Multi-View Images |
NeuralDiff: Segmenting 3D objects that | move | in egocentric videos |
new Copy- | move | forgery detection method using LIOP, A |
new primal-dual algorithm for multilabel graph-cuts problems with approximate | move | s, A |
Nissan Developing Mind-Reading Cars That Anticipate Drivers' Next | move | s and Act Accordingly |
Non-intrusive Method for Copy- | move | Forgery Detection, A |
Objects Can | move | : 3D Change Detection by Geometric Transformation Consistency |
OmniZoomer: Learning to | move | and Zoom in on Sphere at High-Resolution |
Online human | move | s recognition through discriminative key poses and speed-aware action graphs |
Order-Preserving | move | s for Graph-Cut-Based Optimization |
P3 and Beyond: | move | Making Algorithms for Solving Higher Order Functions |
PatchMatch-Based Dense-Field Algorithm for Video Copy- | move | Detection and Localization, A |
Progressive graph matching: Making a | move | of graphs via probabilistic voting |
proposed accelerated image copy- | move | forgery detection, A |
Real Time Fencing | move | Classification and Detection at Touch Time during a Fencing Match |
Recognition Cones That Perceive and Describe Scenes that | move | and Change Over Time |
Recommendation of | move | method refactorings using coupling, cohesion and contextual similarity |
Remote Sensing Data Copy- | move | Forgery Protection Algorithm |
Research Perception Towards Copy- | move | Image Forgery Detection: Challenges and Future Directions |
Review, analysis and parameterisation of techniques for copy- | move | forgery detection in digital images |
Right | move | : A Concept for a Video-Based Choreography Tool, The |
robust technique for copy- | move | forgery detection and localization in digital images via stationary wavelet and discrete cosine transform, A |
RobusterNet: Improving Copy- | move | Forgery Detection with Volterra-based Convolutions |
Rotation robust detection of copy- | move | forgery |
RSTA on the | move | |
RSTA on the | move | : Detection and Tracking of Moving Objects from an Autonomous Mobile Platform |
RSTA on the | move | : Detection and Tracking of Moving Objects from an Autonomous Mobile Platform: Final Report |
Semantically Related Gestures | move | Alike: Towards a Distributional Semantics of Gesture Kinematics |
Serial Image Copy- | move | Forgery Localization Scheme With Source/Target Distinguishment, A |
SIFT-Symmetry: A robust detection method for copy- | move | forgery with reflection attack |
SMDAF: A novel keypoint based method for copy- | move | forgery detection |
Speech Recognition | move | s from Software to Hardware |
Swap and Expansion | move | s revisited and fused, The |
Swarm Robotics | move | s Forward |
tiered | move | -making algorithm for general pairwise MRFs, A |
Toward Unconstrained Fingerprint Recognition: A Fully Touchless 3-D System Based on Two Views on the | move | |
Towards Segmenting Anything That | move | s |
Tracking-by-detection of multiple persons by a resample- | move | particle filter |
Two-Stage Copy- | move | Forgery Detection With Self Deep Matching and Proposal SuperGlue |
UBIRIS.v2: A Database of Visible Wavelength Iris Images Captured On-the- | move | and At-a-Distance, The |
UCM-Net: A U-Net-Like Tampered-Region-Related Framework for Copy- | move | Forgery Detection |
Unsupervised incremental estimation of Gaussian mixture models with 1D split | move | s |
Verified Null- | move | Pruning |
VI-NET: A hybrid deep convolutional neural network using VGG and inception V3 model for copy- | move | forgery classification |
Watch It | move | : Unsupervised Discovery of 3D Joints for Re-Posing of Articulated Objects |
Way They | move | : Tracking Multiple Targets with Similar Appearance, The |
We are More than Our Joints: Predicting how 3D Bodies | move | |
What Catches Your Eyes as You | move | Around? On the Discovery of Interesting Regions in the Street |
What will Happen Next? Forecasting Player | move | s in Sports Videos |
159 for move