Sciweavers

162 search results - page 13 / 33
» Deconvolving Protected Signals
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Zero leakage quantization scheme for biometric verification
Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new ...
Joep A. de Groot, Jean-Paul M. G. Linnartz
ICASSP
2009
IEEE
14 years 2 months ago
Anti-collusion fingerprinting with scalar Costa scheme (SCS) and colluder weight recovery
— An anti-collusion fingerprinting system is developed to protect media files against time-varying collusion attacks based on the scalar Costa scheme (SCS) and colluder weight ...
Byung-Ho Cha, C.-C. Jay Kuo
EDCC
2006
Springer
13 years 11 months ago
SEU Mitigation Techniques for Microprocessor Control Logic
The importance of fault tolerance at the processor architecture level has been made increasingly important due to rapid advancements in the design and usage of high performance de...
T. S. Ganesh, Viswanathan Subramanian, Arun K. Som...
ICASSP
2010
IEEE
13 years 7 months ago
Robust IP and UDP-lite header recovery for packetized multimedia transmission
Recently, Joint Source-Channel Decoding (JSCD) techniques have been proposed to improve the reception of multimedia contents transmitted over error-prone channels. These technique...
François Mériaux, Michel Kieffer
MM
1999
ACM
193views Multimedia» more  MM 1999»
13 years 11 months ago
A dual watermarking technique for images
Digital watermarking is the technique in which a visible/invisible signal (watermark) is embedded in a multimedia document for copyright protection. In this paper, we propose a wa...
Saraju P. Mohanty, K. R. Ramakrishnan, Mohan S. Ka...