Learn More
The design of a pattern recognition system requires careful attention to error estimation. The error rate is the most important descriptor of a classifier's performance. The commonly used estimates of error rate are based on the holdout method, the resubstitution method, and the leave-one-out method. All suffer either from large bias or large variance and(More)
A new hybrid method is presented that combines the scale space filter (SSF) and Markov random field (MRF) for color image segmentation. The fundamental idea of the SSF is to use the convolution of Gaussian functions and image-histogram to generate a scale space image and then find the proper interval bounded by the local extrema of the derivatives. The(More)
−Projection-based face recognition has been widely studied during the past two decades. One of the problems is to require a huge storage space to save the face features obtained from training faces. This paper proposes an SVD-based face retrieval system which requires less memory than the PCA, 2DPCA, Fisher, and 2DFisher approaches. The algorithm tested on(More)
We present a novel hybrid method that includes a modulated scheme for reducing the distortion of the reconstructed image and a two-layered structure for grouping participants with different weights in a secret image sharing problem. Conventional secret image sharing methods suffer from truncation distortion, which is the difference between a pixel value and(More)
A new steganographic method for data hiding in jig swap puzzle images is proposed. First, a color image is taken as input and divided into blocks. Second, each block is rearranged to a new position according to the secret data and a stegokey. The resulting image is a perfect jig swap puzzle. The original image is needed for extracting the secret data. Under(More)
The jigsaw puzzle has been popular from past to present, and there are many jigsaw puzzle images on the Internet. This paper proposes a novel method to hide secret data in jigsaw puzzle images. First, a digital image is taken as input and divided into blocks. Then, a semicircle is drawn and attached to the right and bottom sides of each block. The secret(More)