Sciweavers

603 search results - page 70 / 121
» Embedded Formulas Extraction
Sort
View
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
14 years 2 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
ICCV
2009
IEEE
15 years 1 months ago
Time Series Prediction by Chaotic Modeling of Nonlinear Dynamical Systems
We use concepts from chaos theory in order to model nonlinear dynamical systems that exhibit deterministic behavior. Observed time series from such a system can be embedded into...
Arslan Basharat, Mubarak Shah
ICIP
2000
IEEE
14 years 10 months ago
Copyright Labeling of Printed Images
Digital Watermarking is a labeling technique for digital images which embeds a code into the digital data so the data is marked. Watermarking techniques previously developed deal ...
Hagit Zabrodsky Hel-Or
ICDS
2010
IEEE
14 years 3 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
ISMAR
2008
IEEE
14 years 3 months ago
In-place Augmented Reality
In this paper we present a new vision-based approach for transmitting virtual models for Augmented Reality (AR). A two dimensional representation of the virtual models is embedded...
Nate Hagbi, Oriel Bergig, Jihad El-Sana, Klara Ked...