Sciweavers

11 search results - page 2 / 3
» Document image secret sharing using bit-level processing
Sort
View
ICDE
1999
IEEE
184views Database» more  ICDE 1999»
14 years 7 months ago
Document Warehousing Based on a Multimedia Database System
Nowadays, structured data such as sales and business forms are stored in data warehouses for decision makers to use. Further, unstructured data such as emails, html texts, images,...
Hiroshi Ishikawa, Kazumi Kubota, Yasuo Noguchi, Ko...
SIGUCCS
2003
ACM
13 years 11 months ago
It takes a village to build an image
Managing operating systems and campus-supported software can be a daunting challenge. Many colleges and universities handle these challenges by using disk imaging software to crea...
R. Mark Koan, Kelly Caye, Steven K. Brawn
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
13 years 11 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
13 years 11 months ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...
IJDAR
2006
103views more  IJDAR 2006»
13 years 5 months ago
Table-processing paradigms: a research survey
Tables are a ubiquitous form of communication. While everyone seems to know what a table is, a precise, analytical definition of "tabularity" remains elusive because some...
David W. Embley, Matthew Hurst, Daniel P. Lopresti...