This paper describes a new technique for embedding a message within structured shapes. It is desired that my changes in the shape owing to the embedded message are invisible to a ...
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Cache memories have been extensively used to bridge the gap between high speed processors and relatively slower main memories. However, they are sources of predictability problems...