Sciweavers

1474 search results - page 155 / 295
» Computing in Memory Architectures for Digital Image Processi...
Sort
View
ICASSP
2009
IEEE
15 years 9 months ago
An efficient and robust method for detecting copy-move forgery
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approac...
Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon
185
Voted
AUGHUMAN
2010
15 years 15 days ago
Aided eyes: eye activity sensing for daily life
Our eyes collect a considerable amount of information when we use them to look at objects. In particular, eye movement allows us to gaze at an object and shows our level of intere...
Yoshio Ishiguro, Adiyan Mujibiya, Takashi Miyaki, ...
ICMCS
2006
IEEE
150views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Dynamic View-Dependent Multiresolution Terrain Visualization
Large-area terrain visualization is important to multimedia and military applications. However, such a huge amount of terrain data is not easily able to process on a general perso...
Din-Chang Tseng, Chung-Chieh Huang
100
Voted
MMSEC
2004
ACM
126views Multimedia» more  MMSEC 2004»
15 years 8 months ago
Key-dependency for a wavelet-based blind watermarking algorithm
When a host image is watermarked multiple times by the same algorithm collisions can occur. This makes it difficult for an image to host multiple watermarks. But this hosting is n...
Michael Brachtl, Andreas Uhl, Werner Dietl
GLVLSI
2002
IEEE
109views VLSI» more  GLVLSI 2002»
15 years 7 months ago
Minimizing resources in a repeating schedule for a split-node data-flow graph
Many computation-intensive or recursive applications commonly found in digital signal processing and image processing applications can be represented by data-flow graphs (DFGs). ...
Timothy W. O'Neil, Edwin Hsing-Mean Sha