Sciweavers

200 search results - page 37 / 40
» Digital Watermarking
Sort
View
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 28 days ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
14 years 29 days ago
IP Multicast Video Broadcasting System with User Authentication
This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this ...
Hiroki Onishi, Takashi Satoh, Tetsutaro Uehara, Ka...
ICIP
2006
IEEE
14 years 9 months ago
A Model for the Electronic Representation of Bank Checks
The substitution of physical bank check exchange by electronic check image transfer brings agility, security and cost reduction to the clearing system. In this paper, we propose a...
Danilo Dias, Ricardo L. de Queiroz
CCS
2005
ACM
14 years 27 days ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
DASFAA
2007
IEEE
143views Database» more  DASFAA 2007»
14 years 1 months ago
Using Redundant Bit Vectors for Near-Duplicate Image Detection
Images are amongst the most widely proliferated form of digital information due to affordable imaging technologies and the Web. In such an environment, the use of digital watermar...
Jun Jie Foo, Ranjan Sinha