Sciweavers

849 search results - page 121 / 170
» Completely Non-malleable Schemes
Sort
View
ICIP
2001
IEEE
14 years 10 months ago
A hierarchical image authentication watermark with improved localization and security
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to imp...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
ICIP
1999
IEEE
14 years 10 months ago
An Efficient VLSI Architecture for Separable 2-D Discrete Wavelet Transform
In this paper, we present a VLSI architecture for separable 2-D Discrete Wavelet Transform (DWT). Based on 1-D DWT Recursive Pyramid Algorithm (RPA), a complete 2-D DWT output sch...
Wen-Shiaw Peng, Chen-Yi Lee
ICIP
1997
IEEE
14 years 10 months ago
SVD and log-log frequency sampling with Gabor kernels for invariant pictorial recognition
This paper presents an e cient scheme for a neinvariant object recognition. A ne invariance is obtained by a representation which is based on a new sampling con guration in the fr...
Zhiqian Wang, Jezekiel Ben-Arie
ICDE
2004
IEEE
155views Database» more  ICDE 2004»
14 years 10 months ago
BIDE: Efficient Mining of Frequent Closed Sequences
Previous studies have presented convincing arguments that a frequent pattern mining algorithm should not mine all frequent patterns but only the closed ones because the latter lea...
Jianyong Wang, Jiawei Han
DAC
2006
ACM
14 years 10 months ago
Leakage power reduction of embedded memories on FPGAs through location assignment
Transistor leakage is poised to become the dominant source of power dissipation in digital systems, and reconfigurable devices are not immune to this problem. Modern FPGAs already...
Yan Meng, Timothy Sherwood, Ryan Kastner