PROCEEDINGS VOLUME 6250
DEFENSE AND SECURITY SYMPOSIUM | 17-21 APRIL 2006
Mobile Multimedia/Image Processing for Military and Security Applications
Proceedings Volume 6250 is from: Logo
DEFENSE AND SECURITY SYMPOSIUM
17-21 April 2006
Orlando (Kissimmee), Florida, United States
Secure Multimedia Processing Algorithms and Systems
Proc. SPIE 6250, Reduced memory JPEG decompression for mobile devices, 625001 (2 May 2006); https://doi.org/10.1117/12.665248
Proc. SPIE 6250, An efficient realtime video compression algorithm with high feature preserving capability, 625002 (2 May 2006); https://doi.org/10.1117/12.665731
Proc. SPIE 6250, Compression-designs for knowledge-aided AMTI radar systems, 625003 (12 May 2006); https://doi.org/10.1117/12.669454
Proc. SPIE 6250, A bit planes predictive-transform source coder illustrated with SAR imagery, 625004 (12 May 2006); https://doi.org/10.1117/12.666154
Proc. SPIE 6250, Multiple masks based pixel comparison steganalysis method for mobile imaging, 625005 (2 May 2006); https://doi.org/10.1117/12.666385
Proc. SPIE 6250, An imaging toolbox for smart phone applications, 625006 (2 May 2006); https://doi.org/10.1117/12.665219
Proc. SPIE 6250, Directional edge detection using the logical transform for binary and grayscale images, 625008 (2 May 2006); https://doi.org/10.1117/12.666013
Biometric Authentication for Mobile Devices
Proc. SPIE 6250, SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly, 625009 (2 May 2006); https://doi.org/10.1117/12.665561
Proc. SPIE 6250, Performance evaluation of wavelet-based face verification on a PDA recorded database, 62500A (2 May 2006); https://doi.org/10.1117/12.665716
Proc. SPIE 6250, Audio-visual imposture, 62500B (2 May 2006); https://doi.org/10.1117/12.665707
Proc. SPIE 6250, Comparison of weighting strategies in early and late fusion approaches to audio-visual person authentication, 62500C (2 May 2006); https://doi.org/10.1117/12.667214
Proc. SPIE 6250, Multimodal person authentication on a smartphone under realistic conditions, 62500D (2 May 2006); https://doi.org/10.1117/12.668776
Secure Communication, Mobile, and Wireless Network Issues
Proc. SPIE 6250, Secure steganography designed for mobile platforms, 62500E (2 May 2006); https://doi.org/10.1117/12.662245
Proc. SPIE 6250, A new JPEG-based steganographic algorithm for mobile devices, 62500F (2 May 2006); https://doi.org/10.1117/12.663816
Proc. SPIE 6250, On mobile wireless ad hoc IP video transports, 62500G (2 May 2006); https://doi.org/10.1117/12.665033
Proc. SPIE 6250, Enhancement of node connectivity for mobile ad hoc networks, 62500H (2 May 2006); https://doi.org/10.1117/12.665610
Proc. SPIE 6250, Robust image transmission over MIMO space-time coded wireless systems, 62500I (2 May 2006); https://doi.org/10.1117/12.665904
Proc. SPIE 6250, The mathematical theory of signal processing and compression-designs, 62500J (12 May 2006); https://doi.org/10.1117/12.669455
Proc. SPIE 6250, The effects of malicious nodes on performance of mobile ad hoc networks, 62500K (2 May 2006); https://doi.org/10.1117/12.668263
Proc. SPIE 6250, Secure image communication for network applications, 62500L (2 May 2006); https://doi.org/10.1117/12.664921
Security, Privacy, and Forensic Issues
Proc. SPIE 6250, Privacy enabling technology for video surveillance, 62500M (2 May 2006); https://doi.org/10.1117/12.664945
Proc. SPIE 6250, Object segmentation by fusion of multi-cues in stereoscopic sequences, 62500N (2 May 2006); https://doi.org/10.1117/12.665183
Proc. SPIE 6250, A logarithmic measure of image enhancement, 62500P (2 May 2006); https://doi.org/10.1117/12.665693
Proc. SPIE 6250, Content-based video indexing and searching with wavelet transformation, 62500Q (2 May 2006); https://doi.org/10.1117/12.668365
Proc. SPIE 6250, Wireless just-in-time training of mobile skilled support personnel, 62500R (2 May 2006); https://doi.org/10.1117/12.675052
Back to Top