Sciweavers

526 search results - page 86 / 106
» Embedded Compilation for Multimedia Applications
Sort
View
MEDIAFORENSICS
2010
13 years 11 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
IEEEMM
2007
96views more  IEEEMM 2007»
13 years 9 months ago
Perceptual Issues in Haptic Digital Watermarking
— The growing interest in haptic applications such as skill training, museum displays, multimodal interfaces, aids for people with visual and/or hearing impairments, etc suggests...
Domenico Prattichizzo, Mauro Barni, Gloria Menegaz...
TCSV
2008
124views more  TCSV 2008»
13 years 9 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang
WORDS
2005
IEEE
14 years 3 months ago
Virtual Networks in an Integrated Time-Triggered Architecture
Depending on the physical structuring of large distributed safety-critical real-time systems, one can distinguish federated and integrated system architectures. This paper investi...
Roman Obermaisser, Philipp Peti, Hermann Kopetz
TVLSI
2008
187views more  TVLSI 2008»
13 years 9 months ago
A Design Flow for Architecture Exploration and Implementation of Partially Reconfigurable Processors
During the last years, the growing application complexity, design, and mask costs have compelled embedded system designers to increasingly consider partially reconfigurable applica...
Kingshuk Karuri, Anupam Chattopadhyay, Xiaolin Che...