Sciweavers

977 search results - page 82 / 196
» Secret image sharing
Sort
View
ISMM
2011
Springer
14 years 6 months ago
Towards a Parallel Topological Watershed: First Results
Abstract. In this paper we present a parallel algorithm for the topological watershed, suitable for a shared memory parallel architecture. On a 24-core machine an average speed-up ...
Joël van Neerbos, Laurent Najman, Michael H. ...
146
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication
—Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and...
Yao Liu, Peng Ning, Huaiyu Dai, An Liu
149
Voted
ICCV
2003
IEEE
16 years 5 months ago
Epitomic analysis of appearance and shape
See www.research.microsoft.com/jojic/epitome.htm for videos, comparisons and applications. We present novel simple appearance and shape models that we call epitomes. The epitome o...
Nebojsa Jojic, Brendan J. Frey, Anitha Kannan
165
Voted

Publication
314views
14 years 12 months ago
On the use of discrete Pascal transform in hiding data in images
The Discrete Pascal Transform (DPT) has been proved remarkably useful for edge detection, filter design, discrete-time signal interpolation and data hiding. In the present work a n...
E. E. Varsaki, V. Fotopoulos and A. N. Skodras
NDSS
2002
IEEE
15 years 8 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman