— An audio fingerprint is a content-based compact signature that summarizes an audio recording. Audio Fingerprinting technologies have recently attracted attention since they al...
We present a blind data hiding method for JPEG compressedimageswhichminimizesthe perceptualdistortion due to data embedding.The proposed systempresentsa number of op. tions to the ...
— We use systematic irregular repeat accumulate (IRA) codes as source-channel codes for the transmission of an equiprobable memoryless binary source with side information at the ...
Angelos D. Liveris, Zixiang Xiong, Costas N. Georg...
—Moving object extraction plays a key role in applications such as object-based videoconference, surveillance, and so on. The difficulties of moving object segmentation lie in th...
Abstract— We consider the problem of reachback communication in wireless sensor networks: multiple sensors are deployed on a field, and they collect local measurements of some r...
—In this paper, we present a novel system which combines depth-from-stereo and visual hull reconstruction for acquiring dynamic real-world scenes at interactive rates. First, we ...
Hartmut Schirmacher, Ming Li, Marcus A. Magnor, Ha...
— It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypt...
Abstract—Traditionally, random access protocols have been designed and studied by assuming simple models for the physical layer. We introduce a reception model that incorporates ...