Sciweavers

243 search results - page 20 / 49
» A General Approach to Removing Degeneracies
Sort
View
IWDW
2005
Springer
14 years 3 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
COMPGEOM
2004
ACM
14 years 3 months ago
Adaptive mesh generation for real-time terrain modeling
In this simulation we demonstrate how real-time multiresolution approaches based on underlying geometries are used in terrain visualization. The animated sequence demonstrates app...
Russel A. Apu, Marina L. Gavrilova
LCN
2003
IEEE
14 years 3 months ago
Development of QoS Signaling Protocols in the Internet
— QoS signaling protocol is one of the key components in Internet QoS architectures to establish, maintain, and remove reservation states in network nodes. This paper gives an ov...
Xiaoming Fu
IEEEMSP
2002
IEEE
133views Multimedia» more  IEEEMSP 2002»
14 years 2 months ago
Watermark embedding in DC components of DCT for binary images
—This paper investigates the feasibility of watermark embedding in the discrete cosine transform (DCT) domain for binary images. Watermark embedding is known difficult for binar...
Haiping Lu, Xuxia Shi, Yun Q. Shi, Alex C. Kot, Li...
IMAGING
2004
13 years 11 months ago
Maintaining an Accurate Printer Characterization
In this study, the problem of updating a printer characterization in response to systematic changes in print-device characteristics is addressed with two distinct approaches: the ...
David Littlewood, Ganesh Subbarayan