Sciweavers

1311 search results - page 228 / 263
» Remarks on Hardware Implementation of Image Processing Algor...
Sort
View
AVSS
2009
IEEE
13 years 5 months ago
Multimodal Abandoned/Removed Object Detection for Low Power Video Surveillance Systems
Low-cost and low-power video surveillance systems based on networks of wireless video sensors will enter soon the marketplace with the promise of flexibility, quick deployment an...
Michele Magno, Federico Tombari, Davide Brunelli, ...
DOCENG
2005
ACM
13 years 9 months ago
Encapsulating and manipulating component object graphics (COGs) using SVG
Scalable Vector Graphics (SVG) has an imaging model similar to that of PostScript and PDF but the XML basis of SVG allows it to participate fully, via namespaces, in generalised X...
Alexander J. Macdonald, David F. Brailsford, Steve...
IH
2007
Springer
14 years 1 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
ICDAR
2003
IEEE
14 years 26 days ago
Visualizing Multimedia Content on Paper Documents: Components of Key Frame Selection for Video Paper
The components of a key frame selection algorithm for a paper-based multimedia browsing interface called Video Paper are described. Analysis of video image frames is combined with...
Jonathan J. Hull, Berna Erol, Jamey Graham, Dar-Sh...
TIFS
2008
152views more  TIFS 2008»
13 years 7 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...