Sciweavers

603 search results - page 54 / 121
» Embedded Formulas Extraction
Sort
View
IH
2007
Springer
14 years 2 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
CRV
2006
IEEE
155views Robotics» more  CRV 2006»
14 years 2 months ago
Collaborative Multi-Camera Surveillance with Automated Person Detection
This paper presents the groundwork for a distributed network of collaborating, intelligent surveillance cameras, implemented with low-cost embedded microprocessor camera modules. ...
Trevor Ahmedali, James J. Clark
ICMCS
2006
IEEE
124views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Video Watermarking Based on Neural Networks
In this paper, we propose a novel digital video watermarking scheme based on multi resolution motion estimation and artificial neural network. A multi resolution motion estimation...
Maher El'arbi, Chokri Ben Amar, Henri Nicolas
IWDW
2004
Springer
14 years 2 months ago
A Multi-feature Based Invertible Authentication Watermarking for JPEG Images
: Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this p...
Deng-Pan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang
HPCA
1996
IEEE
14 years 26 days ago
Co-Scheduling Hardware and Software Pipelines
Exploiting instruction-level parallelism (ILP) is extremely important for achieving high performance in application specific instruction set processors (ASIPs) and embedded process...
Ramaswamy Govindarajan, Erik R. Altman, Guang R. G...