Sciweavers

242 search results - page 46 / 49
» Content-Based Watermarking Model
Sort
View
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
13 years 9 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
CVPR
2005
IEEE
14 years 9 months ago
A Two Level Approach for Scene Recognition
Classifying pictures into one of several semantic categories is a classical image understanding problem. In this paper, we present a stratified approach to both binary (outdoor-in...
Le Lu, Kentaro Toyama, Gregory D. Hager
SIGIR
2004
ACM
14 years 1 months ago
A nonparametric hierarchical bayesian framework for information filtering
Information filtering has made considerable progress in recent years.The predominant approaches are content-based methods and collaborative methods. Researchers have largely conc...
Kai Yu, Volker Tresp, Shipeng Yu
MMDB
2003
ACM
132views Multimedia» more  MMDB 2003»
14 years 29 days ago
Image database retrieval utilizing affinity relationships
Recent research effort in Content-Based Image Retrieval (CBIR) focuses on bridging the gap between low-level features and highlevel semantic contents of images as this gap has bec...
Mei-Ling Shyu, Shu-Ching Chen, Min Chen, Chengcui ...