In this paper, we present a novel reversible watermarking scheme for image authentication for JPEG/JPEG-2000 coded images. Since the watermarking scheme is reversible, the exact o...
We describe in this paper the building of a vision sensor able to provide video capture and the associated global motion between two consecutive frames. Our objective is to propose...
F. Gensolen, Guy Cathebras, Lionel Martin, Michel ...
Efficient matching methods are crucial in Image Processing. In the present paper we outline a novel algorithm of ”stable marriages” that is also fair and globally satisfactory ...
Abstract. This paper reviews the extensive state of the art in automated recognition of continuous signs, from different languages, based on the data sets used, features computed, ...
Barbara L. Loeding, Sudeep Sarkar, Ayush Parashar,...
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...