Sciweavers

162 search results - page 26 / 33
» Deconvolving Protected Signals
Sort
View
SSWMC
2004
13 years 8 months ago
Signature-embedding in printed documents for security and forensic applications
Despite the increase in email and other forms of digital communication, the use of printed documents continues to increase every year. Many types of printed documents need to be &...
Aravind K. Mikkilineni, Gazi N. Ali, Pei-Ju Chiang...
WCE
2007
13 years 8 months ago
Information Fusion for Hazard Analysis in Multi-Sensor Systems based on Bayesian Networks
—Modern sliding table saws are equipped with several passive safety devices. However, alone in Germany several hundred severe injuries or limb amputations occur each year due dis...
Jörg Barrho, Johannes Hauger, Uwe Kiencke
JMM2
2008
130views more  JMM2 2008»
13 years 7 months ago
A Robust Image Watermarking Scheme using Singular Value Decomposition
This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as `l...
B. Chandra Mohan, S. Srinivas Kumar
TWC
2008
188views more  TWC 2008»
13 years 7 months ago
Joint power control and beamforming for cognitive radio networks
We consider a secondary usage of spectrum scenario where a secondary network coexists and/or shares the radio spectrum with a primary network to which the spectrum is licensed. The...
Habibul Islam, Ying-Chang Liang, Anh Tuan Hoang
WICOMM
2008
108views more  WICOMM 2008»
13 years 7 months ago
The multimedia broadcast/multicast service
Abstract-- This article provides an overview of the multimedia broadcast/multicast service (MBMS) for universal mobile telecommunications system (UMTS) networks. We first outline t...
George Xylomenos, Vasilis Vogkas, George Thanos