Sciweavers

2058 search results - page 386 / 412
» Virtualizing Real-World Objects
Sort
View
SSWMC
2004
13 years 10 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
VCIP
2003
231views Communications» more  VCIP 2003»
13 years 10 months ago
Light field rendering with omni-directional camera
This paper presents an approach to capture visual appearance of a real environment such as an interior of a room. We propose the method for generating arbitrary viewpoint images b...
Hiroshi Todoroki, Hideo Saito
CHI
2010
ACM
13 years 10 months ago
Designing a CD augmentation for mobile phones
Interacting with physical CDs can be a very tangible and explorative experience. However, physical objects can't provide access to the digital services we are used to when us...
Niels Henze, Susanne Boll
DAGM
2010
Springer
13 years 10 months ago
Exploiting Redundancy for Aerial Image Fusion Using Convex Optimization
Abstract. Image fusion in high-resolution aerial imagery poses a challenging problem due to fine details and complex textures. In particular, color image fusion by using virtual or...
Stefan Kluckner, Thomas Pock, Horst Bischof
CSREASAM
2009
13 years 10 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton