Sciweavers

790 search results - page 126 / 158
» A new approach to detecting the corners in digital images
Sort
View
IWDW
2005
Springer
14 years 1 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
TOG
2008
122views more  TOG 2008»
13 years 8 months ago
Time-resolved 3d capture of non-stationary gas flows
Fluid simulation is one of the most active research areas in computer graphics. However, it remains difficult to obtain measurements of real fluid flows for validation of the simu...
Bradley Atcheson, Ivo Ihrke, Wolfgang Heidrich, Ar...
CSSE
2008
IEEE
14 years 2 months ago
Embedding in Two Least Significant Bits with Wet Paper Coding
In this paper, we present three embedding schemes for extensions of least significant bit overwriting to both of the two lowest bit planes in digital images. Our approaches are in...
Xin Liao, Qiao-Yan Wen
OOPSLA
2007
Springer
14 years 2 months ago
Probabilistic calling context
Calling context enhances program understanding and dynamic analyses by providing a rich representation of program location. Compared to imperative programs, objectoriented program...
Michael D. Bond, Kathryn S. McKinley
ICIP
2005
IEEE
14 years 9 months ago
Spatio-temporal attention model for video content analysis
This paper presents a new model of human attention that allows salient areas to be extracted from video frames. As automatic understanding of video semantic content is still far fr...
Mickael Guironnet, Nathalie Guyader, Denis Pelleri...