Sciweavers

1143 search results - page 26 / 229
» Extraction in software watermarking
Sort
View
IWPC
2010
IEEE
13 years 6 months ago
Extracting Source Code from E-Mails
Alberto Bacchelli, Marco D'Ambros, Michele Lanza
MUM
2004
ACM
170views Multimedia» more  MUM 2004»
14 years 1 months ago
Multiple embedding using robust watermarks for wireless medical images
Within the expanding paradigm of medical imaging and wireless communications there is increasing demand for transmitting diagnostic medical imagery over error-prone wireless commu...
Dominic Osborne, Derek Abbott, Matthew Sorell, Der...
PAMI
2012
11 years 10 months ago
Rhythmic Brushstrokes Distinguish van Gogh from His Contemporaries: Findings via Automated Brushstroke Extraction
— Art historians have long observed the highly characteristic brushstroke styles of Vincent van Gogh and have relied on discerning these styles for authenticating and dating his ...
Jia Li, Lei Yao, Ella Hendriks, James Z. Wang
DRM
2005
Springer
14 years 1 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...