Sciweavers

560 search results - page 77 / 112
» Robust Mesh Watermarking
Sort
View
JSCIC
2008
66views more  JSCIC 2008»
13 years 9 months ago
Mesh Redistribution Strategies and Finite Element Schemes for Hyperbolic Conservation Laws
In this work we consider a new class of Relaxation Finite Element schemes for Conservation Laws, with more stable behavior on the limit area of the relaxation parameter. Combine t...
Christos Arvanitis
ICC
2009
IEEE
135views Communications» more  ICC 2009»
14 years 4 months ago
Tracing Stateful Pirate Decoders
Abstract— Most traitor tracing schemes in the literature assume that pirate decoders are stateless. This stateless assumption, however, is unrealistic especially in case of hardw...
Yongdong Wu, Feng Bao, Ying Qiu
IIHMSP
2006
IEEE
124views Multimedia» more  IIHMSP 2006»
14 years 3 months ago
Design of Collusion-Free Codes Based on MAI-Free Principle
The design of collusion-free codes for data hiding systems is investigated, and two new collusion-free codes are proposed in this work. They are called the Orthogonal Spreading (O...
Byung-Ho Cha, C. C. Jay Kuo
SADFE
2005
IEEE
14 years 3 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
GRAPP
2007
13 years 11 months ago
Fitting 3D morphable models using implicit representations
We consider the problem of approximating the 3D scan of a real object through an affine combination of examples. Common approaches depend either on the explicit estimation of poi...
Curzio Basso, Alessandro Verri