Sciweavers

853 search results - page 62 / 171
» Flexible authentication of images
Sort
View
MIR
2010
ACM
188views Multimedia» more  MIR 2010»
13 years 8 months ago
Beyond 2D-grids: a dependence maximization view on image browsing
Ideally, one would like to perform image search using an intuitive and friendly approach. Many existing image search engines, however, present users with sets of images arranged i...
Novi Quadrianto, Kristian Kersting, Tinne Tuytelaa...
ICIP
2010
IEEE
13 years 5 months ago
Image quantization under spatial smoothness constraints
Quantization, defined as the act of attributing a finite number of grey-levels to an image, is an essential task in image acquisition and coding. It is also intricately linked to ...
Anna Jezierska, Caroline Chaux, Hugues Talbot, Jea...
ICMCS
2006
IEEE
178views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Block-Based Lossless Data Hiding in Delta Domain
Digital watermarking is one of the ways to prove the ownership and the authenticity of the media. However, some applications, such as medical and military, are sensitive to distor...
Shu-Kei Yip, Oscar C. Au, Hoi-Ming Wong, Chi-Wang ...
PERCOM
2010
ACM
13 years 6 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...
CVPR
2004
IEEE
14 years 9 months ago
Programmable Imaging Using a Digital Micromirror Array
In this paper, we introduce the notion of a programmable imaging system. Such an imaging system provides a human user or a vision system significant control over the radiometric a...
Shree K. Nayar, Vlad Branzoi, Terrance E. Boult