Sciweavers

1038 search results - page 185 / 208
» Code Compression
Sort
View
ISCAS
2003
IEEE
185views Hardware» more  ISCAS 2003»
14 years 3 months ago
A semi-fragile object based video authentication system
This paper presents a semi-fragile object-based authentication solution for MPEG4 video. To protect the integrity of the video objects / sequences, a content-based watermark is em...
Dajun He, Qibin Sun, Qi Tian
ICMCS
2000
IEEE
86views Multimedia» more  ICMCS 2000»
14 years 2 months ago
Water-Filling for Watermarking?
In this paper we address the question: Is water-filling appropriate for watermarking? The water-filling paradigm is a traditional solution to the capacity maximization of parall...
Deepa Kundur
PLDI
1999
ACM
14 years 2 months ago
Whole Program Paths
Whole program paths (WPP) are a new approach to capturing and representing a program’s dynamic—actually executed—control flow. Unlike other path profiling techniques, which ...
James R. Larus
ICDAR
1997
IEEE
14 years 2 months ago
Document image similarity and equivalence detection
A hierarchical algorithm is presented for determining the similarity and equivalence of document images. Features extracted from the CCIIT fax-compressed representations of two im...
Jonathan J. Hull, John F. Cullen
CORR
2004
Springer
110views Education» more  CORR 2004»
13 years 9 months ago
Shannon Information and Kolmogorov Complexity
The elementary theories of Shannon information and Kolmogorov complexity are cmpared, the extent to which they have a common purpose, and where they are fundamentally different. T...
Peter Grünwald, Paul M. B. Vitányi