Sciweavers

603 search results - page 77 / 121
» Embedded Formulas Extraction
Sort
View
ICMCS
2006
IEEE
178views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Spatially Adaptive Wavelet Thresholding for Image Watermarking
In this paper, we introduce a new robust image watermarking technique based on the Discrete Wavelet Transform (DWT). The proposed method extends the concept of image denoising to ...
Mahmood Al-khassaweneh, Selin Aviyente
ICMCS
2006
IEEE
185views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Lossless Visible Watermarking
The embedding distortion of visible watermarking is usually larger than that of invisible watermarking. In order to maintain the signal fidelity after the watermark extraction, â€...
Shu-Kei Yip, Oscar C. Au, Chi-Wang Ho, Hoi-Ming Wo...
ICMCS
2006
IEEE
145views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Confronting the Synchronization Problem of Semantic Region Under Geometric Attacks
In this paper, an affine invariant watermarking scheme, robust to geometric attacks, is proposed and applied to face regions. Initially, face regions are unsupervisedly extracted ...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
ACSAC
2005
IEEE
14 years 2 months ago
Fault Attacks on Dual-Rail Encoded Systems
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
Jason Waddle, David Wagner
ICDAR
2005
IEEE
14 years 2 months ago
Image Analysis for Efficient Categorization of Image-based Spam E-mail
To circumvent prevalent text-based anti-spam filters, spammers have begun embedding the advertisement text in images. Analogously, proprietary information (such as source code) ma...
Hrishikesh Aradhye, Gregory K. Myers, James A. Her...