Sciweavers

603 search results - page 78 / 121
» Embedded Formulas Extraction
Sort
View
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
14 years 2 months ago
A Reversible Watermarking Scheme for JPEG-2000 Compressed Images
In this paper, we present a novel reversible watermarking scheme for image authentication for JPEG/JPEG-2000 coded images. Since the watermarking scheme is reversible, the exact o...
Sabu Emmanuel, Chee Kiang Heng, Amitabha Das
ACIVS
2005
Springer
14 years 2 months ago
An Image Sensor with Global Motion Estimation for Micro Camera Module
We describe in this paper the building of a vision sensor able to provide video capture and the associated global motion between two consecutive frames. Our objective is to propose...
F. Gensolen, Guy Cathebras, Lionel Martin, Michel ...
ICIAR
2005
Springer
14 years 2 months ago
Marrying Level Lines for Stereo or Motion
Efficient matching methods are crucial in Image Processing. In the present paper we outline a novel algorithm of ”stable marriages” that is also fair and globally satisfactory ...
Nikom Suvonvorn, Samia Bouchafa, Bertrand Zavidovi...
ICCHP
2004
Springer
14 years 2 months ago
Progress in Automated Computer Recognition of Sign Language
Abstract. This paper reviews the extensive state of the art in automated recognition of continuous signs, from different languages, based on the data sets used, features computed, ...
Barbara L. Loeding, Sudeep Sarkar, Ayush Parashar,...
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
14 years 2 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi