Sciweavers

148 search results - page 7 / 30
» Advantages of Using Feature Selection Techniques on Steganal...
Sort
View
TASLP
2002
87views more  TASLP 2002»
13 years 7 months ago
A new audio coding scheme using a forward masking model and perceptually weighted vector quantization
This paper presents a new audio coder that includes two techniques to improve the sound quality of the audio coding system. First, a forward masking model is proposed. This model e...
Yuan-Hao Huang, Tzi-Dar Chiueh
IOLTS
2002
IEEE
99views Hardware» more  IOLTS 2002»
14 years 22 days ago
A BIST-Based Solution for the Diagnosis of Embedded Memories Adopting Image Processing Techniques
This paper proposes a new solution for the diagnosis of faults into embedded RAMs, currently under evaluation within STMicroelectronics. The proposed scheme uses dedicated circuit...
Davide Appello, Alessandra Fudoli, Vincenzo Tancor...
CCS
2005
ACM
14 years 1 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
IVC
2002
90views more  IVC 2002»
13 years 7 months ago
Force field energy functionals for image feature extraction
Ears are an emergent biometric accruing application advantages including no requirement for subject contact and acquisition without demand. To recognize a subject's ear, we a...
David J. Hurley, Mark S. Nixon, John N. Carter
ICNP
2002
IEEE
14 years 23 days ago
An Ultra-fast Shared Path Protection Scheme - Distributed Partial Information Management, Part II
— This paper describes a novel, ultra-fast heuristic algorithm to address an NP-hard optimization problem. One of its significances is that, for the first time, the paper shows...
Dahai Xu, Chunming Qiao, Yizhi Xiong