Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness...
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
Background: The ability to search for and precisely compare similar phenotypic appearances within and across species has vast potential in plant science and genetic research. The ...
Jaturon Harnsomburana, Jason M. Green, Adrian S. B...
We examine the problem of reliable networked control when the communication channel between the controller and the actuator periodically drops packets and is faulty i.e., corrupts...
Shreyas Sundaram, Jian Chang, Krishna K. Venkatasu...
ImageNet is a large-scale database of object classes with millions of images. Unfortunately only a small fraction of them is manually annotated with bounding-boxes. This prevents ...