Jiexin Pu

Learn More
To eliminate the effects of illumination variation, the conventional approaches firstly produce a compensation-based face image under standard illumination from the input image and then match the image with the face templates in a database. This method is not inapplicable to the input image with large illumination variation. Therefore, a novel method for(More)
In this paper, we propose a fusion classification method based on reconstruction error and normalized distance for palmprint recognition. This method first obtains an approximate representation of the test sample by solving a linear system in which the test sample is assumed to be a linear combination of all the original training samples. Then it replaces(More)
Statistical modeling of wavelet subbands has frequently been used for image recognition and retrieval. However, traditional wavelets are unsuitable for use with images containing distributed discontinuities, such as edges. Shearlets are a newly developed extension of wavelets that are better suited to image characterization. Here, we propose novel texture(More)
  • Zhumu Fu, Leipo Liu, Aiyun Gao, Jiexin Pu
  • 2012
This paper considers the problems of dynamic output feedback H control for uncertain switched singular system with parametric uncertainties. A switching rule and a switched dynamic output feedback controller are designed to guarantee that the closed-loop system is asymptotically stable with a prescribed H disturbance attenuation level . Such sufficient(More)
The emerging multimedia social network is a convenient platform on which multimedia content, such as e-books, digital images, audios and videos can be distributed and shared. In the open network scenario, users can randomly share or spread digital contents protected by copyright; thus, Digital Rights Management (DRM) has become a growing problem. This(More)
—In recent decade, DRM (Digital Rights Management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal(More)