Sciweavers

823 search results - page 84 / 165
» Embedded Robustness Ips
Sort
View
ICPR
2008
IEEE
14 years 4 months ago
Scale invariant face recognition using probabilistic similarity measure
In video surveillance, the size of face images is very small. However, few works have been done to investigate scale invariant face recognition. Our experiments on appearance-base...
Zhifei Wang, Zhenjiang Miao
IWDW
2007
Springer
14 years 4 months ago
Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding
In this paper, we propose a print-scan resilient watermarking method which takes advantage of multiple watermarking. The method presented here consists of three separate watermarks...
Anu Pramila, Anja Keskinarkaus, Tapio Seppäne...
SG
2007
Springer
14 years 4 months ago
Data-Embeddable Texture Synthesis
Abstract. Data hiding techniques onto images provide tools for protecting copyright or sending secret messages, and they are currently utilized as a simple input device of a cell p...
Hirofumi Otori, Shigeru Kuriyama
ICICIC
2006
IEEE
14 years 4 months ago
Relational Databases Watermark Technique Based on Content Characteristic
With the development of the Internet and wide applications of databases, the databases providers are worrying about their ownership of the databases. Combined with the digital wat...
Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, S...
MEDIAFORENSICS
2010
13 years 11 months ago
Modern steganalysis can detect YASS
YASS is a steganographic algorithm for digital images that hides messages robustly in a key-dependent transform domain so that the stego image can be subsequently compressed and d...
Jan Kodovský, Tomás Pevný, Je...