Sciweavers

59 search results - page 6 / 12
» Disjunctive image computation for embedded software verifica...
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 1 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
ICIP
2005
IEEE
14 years 9 months ago
Watermarking JBIG2 text region for image authentication
An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, usin...
Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ri...
EMSOFT
2008
Springer
13 years 9 months ago
Symbolic analysis for improving simulation coverage of Simulink/Stateflow models
Aimed at verifying safety properties and improving simulation coverage for hybrid systems models of embedded control software, we propose a technique that combines numerical simul...
Rajeev Alur, Aditya Kanade, S. Ramesh, K. C. Shash...
DCC
1995
IEEE
13 years 11 months ago
CREW: Compression with Reversible Embedded Wavelets
Compression with Reversible Embedded Wavelets (CREW) is a uni ed lossless and lossy continuous-tone still image compression system. It is wavelet-based using a \reversible" a...
A. Zandi, James D. Allen, Edward L. Schwartz, Mart...
ICESS
2007
Springer
14 years 2 months ago
Face Detection on Embedded Systems
Over recent years automated face detection and recognition (FDR) have gained significant attention from the commercial and research sectors. This paper presents an embedded face de...
Abbas Bigdeli, Colin Sim, Morteza Biglari-Abhari, ...