The performance of irregular applications on modern computer systems is hurt by the wide gap between CPU and memory speeds because these applications typically underutilize multi-...
John M. Mellor-Crummey, David B. Whalley, Ken Kenn...
Most digital data hiding schemes are sensitive to simple geometric attacks namely rotation, cropping, and scaling. Of these, rotational attacks possess the capability to not only ...
: The paper proposes a lossy compression mechanism for 3D models (3D meshes) by improving existing compression mechanism such as progressive meshes and single refinement mesh compr...
A new method for hiding digital data in the bitstream of an ACELP speech codec is proposed in this paper. The key element of our method is an alternative search strategy for the A...
In this paper, we propose a novel transform that preserves the dynamic range—infinity-norm rotation. This transform is perfectly reversible and piecewise linear, and keeps the m...