Sciweavers

1205 search results - page 173 / 241
» Efficient robust optimization for robust control with constr...
Sort
View
ICIP
2008
IEEE
14 years 10 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
ICIP
2005
IEEE
14 years 10 months ago
Game-theoretic analysis of a semi-fragile watermarking scheme based on SCS
Semi-fragile watermarking can be used to detect illegal and local manipulation of images, while being robust towards legal manipulations such as lossy compression. This paper desc...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
ICPR
2008
IEEE
14 years 10 months ago
Simultaneous multi-modal registration of multiple images based on multi-dimensional joint phase moment distributions
In this paper, a novel method for simultaneously registering multiple images acquired from different imaging modalities is presented. The optimal alignment is computed as the set ...
Alexander Wong
ICML
2003
IEEE
14 years 9 months ago
Transductive Learning via Spectral Graph Partitioning
We present a new method for transductive learning, which can be seen as a transductive version of the k nearest-neighbor classifier. Unlike for many other transductive learning me...
Thorsten Joachims
AIIA
2005
Springer
14 years 2 months ago
Multigranular Scale Speech Recognizers: Technological and Cognitive View
We present a proposal for an Automatic Speech Recognizer based on a “multigranular” model. The leading hypothesis is that speech signal contains information distributed on more...
Francesco Cutugno, Gianpaolo Coro, Massimo Petrill...