Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Abstract-- This paper presents an authentication watermarking method which can localize the tampering regions in fine granularity. Unlike the previous block-wise Tampering-Localiza...
Most of the watermarking schemes that have been proposed until now employ a correlator in the detection stage. The current paper proposes a new detector scheme that can be applied...
Abstract— The unstructured nature of cross-country environments poses a great deal of challenges to obstacle detection algorithms. This paper presents an algorithm able to perfor...