Sciweavers

2192 search results - page 291 / 439
» Embedded function composition
Sort
View
IH
2009
Springer
14 years 4 months ago
Forensic Tracking Watermarking against In-theater Piracy
Many illegal copies of digital movies by camcorder capture are found on the Internet or on the black market before their official release. Due to the angle of the camcorder relativ...
Min-Jeong Lee, Kyung-Su Kim, Heung-Kyu Lee
DELTA
2008
IEEE
14 years 4 months ago
AES-Based BIST: Self-Test, Test Pattern Generation and Signature Analysis
Re-using embedded resources for implementing builtin self test mechanisms allows test cost reduction. In this paper we demonstrate how to implement costefficient built-in self tes...
M. Doulcier, Marie-Lise Flottes, Bruno Rouzeyre
ETFA
2008
IEEE
14 years 4 months ago
Virtual prototyping through co-simulation of a Cartesian plotter
This paper shows a model-based design trajectory for the development of real-time embedded control software using virtual prototyping. As a test case, a Cartesian plotter is desig...
Marcel A. Groothuis, Arjen S. Damstra, Jan F. Broe...
ICASSP
2008
IEEE
14 years 4 months ago
Generalized Improved Spread Spectrum watermarking robust against translation attacks
In this work, we consider the ISS (improved spread spectrum) watermarking [1] framework, and propose a generalized version of it, termed “Generalized Improved Spread Spectrum”...
Neslihan Gerek, Mehmet Kivanç Mihçak
ICASSP
2008
IEEE
14 years 4 months ago
Cryptographic measures in information hiding
Recent information hiding schemes are scrutinized in terms of their cryptographic performance. We establish conditions under which the key equivocation function is optimal for the...
Phillip A. Regalia