Sciweavers

113 search results - page 13 / 23
» Correcting errors without leaking partial information
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 1 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
SIGECOM
2008
ACM
90views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Non-myopic strategies in prediction markets
One attractive feature of market scoring rules [Hanson '03] is that they are myopically strategyproof: It is optimal for a trader to report her true belief about the likeliho...
Stanko Dimitrov, Rahul Sami
RT
1999
Springer
13 years 12 months ago
Computing Visibility for Triangulated Panoramas
A visibility algorithm for triangulated panoramas is proposed. The algorithm can correctly resolve the visibility without making use of any depth information. It is especially usef...
Chi-Wing Fu, Tien-Tsin Wong, Pheng-Ann Heng
DFT
2005
IEEE
89views VLSI» more  DFT 2005»
14 years 1 months ago
On-Line Identification of Faults in Fault-Tolerant Imagers
Detection of defective pixels that develop on-line is a vital part of fault tolerant schemes for repairing imagers during operation. This paper presents a new algorithm for the id...
Glenn H. Chapman, Israel Koren, Zahava Koren, Jozs...
IMAGING
2001
13 years 9 months ago
High Dynamic Range Imaging
The ultimate in color reproduction is a display that can produce arbitrary spectral content over a 300-800 nm range with 1 arc-minute resolution in a full spherical hologram. Alth...
Greg Ward