Sciweavers

1143 search results - page 27 / 229
» Extraction in software watermarking
Sort
View
DAC
1998
ACM
16 years 4 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...
ICIP
2003
IEEE
16 years 4 months ago
Dither-based secure image hashing using distributed coding
We propose an image hashing algorithm that is based on distributed compression principles. The algorithm assumes the availability of a robust feature vector extracted from the ima...
Mark Johnson, Kannan Ramchandran
PCM
2009
Springer
180views Multimedia» more  PCM 2009»
15 years 7 months ago
RST-Invariant Semi-fragile Image Authentication Based on DWT-Coefficient Quantization
Abstract. In this paper, we propose an image moment-based geometric normalization to be applied before embedding and extracting a digital watermark in the DWT-domain of JPEG2000. A...
Mathias Schlauweg, Erika Müller
GLVLSI
2003
IEEE
130views VLSI» more  GLVLSI 2003»
15 years 8 months ago
Zero overhead watermarking technique for FPGA designs
FPGAs, because of their re-programmability, are becoming very popular for creating and exchanging VLSI intellectual properties (IPs) in the reuse-based design paradigm. Existing w...
Adarsh K. Jain, Lin Yuan, Pushkin R. Pari, Gang Qu
ICSE
1999
IEEE-ACM
15 years 7 months ago
Linux as a Case Study: Its Extracted Software Architecture
Ivan T. Bowman, Richard C. Holt, Neil V. Brewster