scispace - formally typeset
Search or ask a question

Showing papers in "Pattern Recognition in 2008"


Journal ArticleDOI
TL;DR: A survey of kernel and spectral clustering methods, two approaches able to produce nonlinear separating hypersurfaces between clusters and an explicit proof of the fact that these two paradigms have the same objective is reported.

832 citations


Journal ArticleDOI
TL;DR: Nonnegative Double Singular Value Decomposition (NNDSVD), a new method designed to enhance the initialization stage of nonnegative matrix factorization (NMF), is described and suggests that NNDSVD leads to rapid reduction of the approximation error of many NMF algorithms.

630 citations


Journal ArticleDOI
TL;DR: This paper considers a general problem of learning from pairwise constraints in the form of must-links and cannot-links, and aims to learn a Mahalanobis distance metric.

541 citations


Journal ArticleDOI
TL;DR: Experimental results show that the proposed robust path-based spectral clustering method consistently outperforms other methods due to its higher robustness, and comparisons with some other methods show this method to be significantly more robust than spectral clusters and path- based clustering.

523 citations


Journal ArticleDOI
TL;DR: An improved voting scheme for the Hough transform is presented that allows a software implementation to achieve real-time performance even on relatively large images and produces a much cleaner voting map and makes the transform more robust to the detection of spurious lines.

412 citations


Journal ArticleDOI
TL;DR: The Constrained Local Model (CLM) algorithm is more robust and more accurate than the AAM search method, which relies on the image reconstruction error to update the model parameters, and improves localisation accuracy on photographs of human faces, magnetic resonance images of the brain and a set of dental panoramic tomograms.

385 citations


Journal ArticleDOI
TL;DR: This work presents a method for spotting sporadically occurring gestures in a continuous data stream from body-worn inertial sensors based on a natural partitioning of continuous sensor signals and uses a two-stage approach for the spotting task.

380 citations


Journal ArticleDOI
TL;DR: This work proposes four new dynamic selection schemes which explore the properties of the oracle concept and suggests that the proposed schemes, using the majority voting rule for combining classifiers, perform better than the static selection method.

378 citations


Journal ArticleDOI
TL;DR: Experiments with synthetic and real data sets show that the proposed ECM (evidential c-means) algorithm can be considered as a promising tool in the field of exploratory statistics.

359 citations


Journal ArticleDOI
TL;DR: The modified finite Radon transform is proposed, which can extract principal lines effectively and efficiently even in the case that the palmprint images contain many long and strong wrinkles.

332 citations


Journal ArticleDOI
TL;DR: It is shown that imputation with the tested methods on average improves classification accuracy when compared to classification without imputation, and some classifiers such as C4.5 and Nai@?ve-Bayes were found to be missing data resistant, i.e., they can produce accurate classification in the presence of missing data.

Journal ArticleDOI
TL;DR: This paper proposes a multilevel reversible data hiding scheme based on the difference image histogram modification that uses the peak point to hide messages through a joint imperceptibility and hiding capacity evaluation.

Journal ArticleDOI
TL;DR: Experimental results show the modified Hausdorff distance algorithm reaches 0% of equal error rate (EER) on the database of 47 distinct subjects, which indicates the minutiae features of the vein pattern can be used to perform personal verification tasks.

Journal ArticleDOI
TL;DR: A novel minutiae-based fingerprint matching algorithm that ranks 1st on DB3, the most difficult database in FVC2002, and on the average ranks 2nd on all 4 databases.

Journal ArticleDOI
TL;DR: By using the proposed algorithm, a 90% tampered image can be recovered to a dim yet still recognizable condition (PSNR ~20dB).

Journal ArticleDOI
TL;DR: A novel secret image sharing scheme combining steganography and authentication based on Chinese remainder theorem (CRT) is proposed that not only improves the authentication ability but also enhances the visual quality of the stego images.

Journal ArticleDOI
TL;DR: Experimental results show that the proposed ''Laplacianpalm'' approach provides a better representation and achieves lower error rates in palm recognition, and the proposed multimodal method outperforms any of its individual modality.

Journal ArticleDOI
TL;DR: This paper presents a new model of camera lens distortion, according to which lens distortion is governed by the coefficients of radial distortion and a transform from ideal image plane to real sensor array plane.

Journal ArticleDOI
TL;DR: This paper investigates the cospectrality of the various matrix representations over large graph and tree sets, extending the work of previous authors and shows that the Euclidean distance between spectra tracks the edit distance between graphs over a wide range of edit costs.

Journal ArticleDOI
TL;DR: An empirical investigation of the shapes produced by the algorithm provides experimental evidence that with appropriate parameterization the algorithm is able to accurately characterize the shape of a wide range of different point distributions and densities.

Journal ArticleDOI
TL;DR: The quantised random projection ensemble based on the Johnson-Lindenstrauss Lemma is used to establish the mathematical foundation of BioHash, a form of cancellable biometrics which mixes a set of user-specific random vectors with biometric features and elucidate the characteristics of Bio hash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem.

Journal ArticleDOI
TL;DR: Experimental results on Yale and CMU PIE face databases convince us that the proposed method provides a better representation of the class information and obtains much higher recognition accuracies.

Journal ArticleDOI
TL;DR: This paper proposes to use another form of supervision information for feature selection, i.e. pairwise constraints, which specifies whether a pair of data samples belong to the same class (must-link constraints) or different classes (cannot- link constraints).

Journal ArticleDOI
TL;DR: A novel algorithm for image feature extraction, namely, the two-dimensional locality preserving projections (2DLPP), which directly extracts the proper features from image matrices based on locality preserving criterion is proposed.

Journal ArticleDOI
TL;DR: A new method for smoothing both gray-scale and color images is presented that relies on the heat diffusion equation on a graph that has the effect of smoothing within regions, but does not blur region boundaries.

Journal ArticleDOI
TL;DR: A new version of the global k-means algorithm, an incremental algorithm that dynamically adds one cluster center at a time and uses each data point as a candidate for the k-th cluster center, is proposed.

Journal ArticleDOI
TL;DR: This tutorial examines the problem area, its methods, successes and failures, focusing on the nature of the speech signal and techniques to accomplish useful data reduction, and compares it with other areas of PR.

Journal ArticleDOI
TL;DR: The suggested algorithm is based on several steps and has been tested on a large set of shape databases providing performances for both in recognition and in retrieval superior to most of previously proposed approaches.

Journal ArticleDOI
TL;DR: An integrated image fusion and match score fusion of multispectral face images using [email protected] SVM and Dezert Smarandache theory of fusion which is based on plausible and paradoxical reasoning is presented.

Journal ArticleDOI
TL;DR: This paper proposes a semi-supervised dimensionality reduction framework, which can efficiently handle the unlabeled data and can significantly improve the accuracy rates of the corresponding supervised and unsupervised approaches.