منابع مشابه
Digital Makeup from Internet Images
We present a novel approach of color transfer between images by exploring their high-level semantic information. First, we set up a database which consists of the collection of downloaded images from the internet, which are segmented automatically by using matting techniques. We then, extract image foregrounds from both source and multiple target images. Then by using image matting algorithms, ...
متن کاملAdaptive Digital Makeup
A gender and skin color ethnicity based automatic digital makeup system is presented. An automatic face makeup system which applies example based digital makeup based on skin ethnicity color and gender type. One major advantage of the system is that the makeup is based on the skin color and gender type, which is very necessary for an effective makeup. Another strong advantage is that it applies...
متن کاملRecovering badly exposed objects from digital photos using internet images
In this paper we consider the problem of clipped-pixel recovery over an entire badly exposed image region, using two correctly exposed images of the scene that may be captured under different conditions. The first reference image is used to recover texture; feature points are extracted along the boundaries of both the source and reference regions, while a warping function deforms the reference ...
متن کاملFrom Digital Television to Internet?
This paper provides a general technical overview of the Multimedia Home Platform (MHP) specifications. MHP is a generic interface between digital applications and user machines, whether they happen to be set top boxes, digital TV sets or Multimedia Pc’s. MHP extends the DVB open standards. Addressed are MHP architecture, System core, and MHP Profiles.
متن کاملUsing Digital Images to spread Executable Code on Internet
. Steganography is defined as covered writing and it has been used to achieve confidentiality. Most of research in this domain has focused in just sending plain data. In this paper we use steganography as a way to spread executable code instead of just communicating a secret message. The application of our proposal may contrast, could be using for spreading malicious code or for protecting soft...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Optik
سال: 2018
ISSN: 0030-4026
DOI: 10.1016/j.ijleo.2017.12.047