Learn More
Over the last decade, feature point descriptors such as SIFT have become indispensable tools in the computer vision community. But, the descriptor's high computational overhead becomes a significant concern when it has to be on a device with limited computational and storage resources. In order to make descriptors faster to compute and more compact, several(More)
Mobile IP enables a mobile node (MN) to move around without losing their transport-layer connectivity by using resources in a foreign domain network. Mobile IP (MIP) is expected to be the core infrastructure of future mobile communication, but two services must be provided before the wide deployment of MIP. One is to provide secure communication and the(More)
While the methods for people counting based on moving interest points have been shown good performance, the problem related to count static or temporarily stopped people remains particularly challenging. This paper presents a novel method for people counting which is considering moving and stationary people. The proposed method first separates the moving(More)
Our implementation is aimed at estimating the possibility of employing TCG-based trusted computing mechanisms, such as verifying the code-integrity of executables and libraries at load-time and remote attestation, in mobile devices. Considering the restrained resource in mobile device, the experimentation shows promising results, thereby enabling these(More)
Selective encryption of video data is not a new idea and various techniques proposed in previous literatures can effectively protect sensitive data from unauthorized access. After the initial appearance of selective encryption, some principles have become well known and widely adopted. One of the principles is the standard format compliance, which means(More)
In this paper, we propose the objectionable image detection system based on ROI. The proposed system excels in that ROI detection method is specialized in objectionable image detection. In addition, we propose the novel feature consisting of weighted SCD based on ROI and skin color structure descriptor for classifying objectionable image. Using the ROI(More)
The existing pedestrian counting methods use the various keypoint detectors but there is no attempt to find a suitable keypoint detector for counting pedestrians. Therefore, in this paper, we compare the various keypoint detectors using a public dataset. Our evaluation framework uses the processing time of keypoint detection and matching as a performance(More)
This paper proposes a specialized Web robot to automatically collect objectionable Web contents for use in an objectionable Web content classification system, which creates the URL database of objectionable Web contents. It aims at shortening the update period of the DB, increasing the number of URLs in the DB, and enhancing the accuracy of the information(More)