This paper examines the role of attacker’s memory in Quantization Index Modulation (QIM) watermarking systems. First we derive the attacker’s noise distribution that maximizes...
This paper describes a context information acquisition framework for a personal device that equips a variety of sensors. The framework captures context information about a user an...
This paper describes a novel approach to embedded software development. Instead of using a combination of C code and modeling tools, we propose an approach where modeling and progr...
— Networks for real-time embedded systems are a key emerging technology for current and future systems. Such networks need to enable reliable communication without requiring sign...
We present an authenticable graphical barcode symbology, and describe a system for its reliable encoding and decoding. The graphical barcode is generated by modulating halftone pa...
Doron Shaked, Zachi Baharav, Avi Levy, Jonathan Ye...