Sciweavers

274 search results - page 49 / 55
» Anti-forensics of JPEG compression
Sort
View
IJNSEC
2007
193views more  IJNSEC 2007»
13 years 7 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
CVPR
2009
IEEE
1378views Computer Vision» more  CVPR 2009»
15 years 2 months ago
A Novel Feature Descriptor Invariant to Complex Brightness Changes
We describe a novel and robust feature descriptor called ordinal spatial intensity distribution (OSID) which is invariant to any monotonically increasing brightness changes. Many t...
Feng Tang, Suk Hwan Lim, Nelson L. Chang, Hai Tao
ECCV
2002
Springer
14 years 9 months ago
Dynamic Trees: Learning to Model Outdoor Scenes
Abstract. This paper considers the dynamic tree (DT) model, first introduced in [1]. A dynamic tree specifies a prior over structures of trees, each of which is a forest of one or ...
Nicholas J. Adams, Christopher K. I. Williams
ICIP
2005
IEEE
14 years 9 months ago
Embedded image coding with context partitioning and quantization
As a key part of universal source coding, context quantization is very important for improving compression performance. However, in most existing methods, the quantizer is trained...
Hua Cai, Xing San, Jiang Li
ICIP
2004
IEEE
14 years 9 months ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...