Sciweavers

977 search results - page 75 / 196
» Secret image sharing
Sort
View
ICIP
2005
IEEE
16 years 5 months ago
Hiding privacy information in video surveillance system
This paper proposes a detailed framework of storing privacy information in surveillance video as a watermark. Authorized personnel is not only removed from the surveillance video ...
Wei Zhang, Sen-Ching S. Cheung, Minghua Chen
MMSEC
2005
ACM
274views Multimedia» more  MMSEC 2005»
15 years 9 months ago
LSB steganalysis based on high-order statistics
We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samp...
Sorina Dumitrescu, Xiaolin Wu
ECCV
2010
Springer
15 years 8 months ago
Semantic Label Sharing for Learning with Many Categories
In an object recognition scenario with tens of thousands of categories, even a small number of labels per category leads to a very large number of total labels required. We propose...
144
Voted
HPCA
2002
IEEE
16 years 4 months ago
CableS: Thread Control and Memory Management Extensions for Shared Virtual Memory Clusters
Clusters of high-end workstations and PCs are currently used in many application domains to perform large-scale computations or as scalable servers for I/O bound tasks. Although c...
Peter Jamieson, Angelos Bilas
148
Voted
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
15 years 10 months ago
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Abstract. We examine the use of randomness extraction and expansion in key agreement (KA) protocols to generate uniformly random keys in the standard model. Although existing works...
Yvonne Cliff, Colin Boyd, Juan Manuel Gonzá...