Sciweavers

37 search results - page 7 / 8
» Hierarchical watermarking for secure image authentication wi...
Sort
View
JMM2
2006
133views more  JMM2 2006»
13 years 6 months ago
An Adaptive Method for Image Recovery in the DFT Domain
In image authentication research, a common approach is to divide a given image into a number of smaller blocks, and embed a fragile watermark into each block. The modifications can...
Peining Tao, Ahmet M. Eskicioglu
MM
2010
ACM
146views Multimedia» more  MM 2010»
13 years 6 months ago
Understanding the security and robustness of SIFT
Many content-based retrieval systems (CBIRS) describe images using the SIFT local features because of their very robust recognition capabilities. While SIFT features proved to cop...
Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Ams...
ICMCS
2007
IEEE
211views Multimedia» more  ICMCS 2007»
14 years 17 days ago
Context-Based Scalable Coding and Representation of High Resolution Art Pictures for Remote Data Access
EROS is the largest database in the world of high resolution art pictures. The TSAR project is designed to open it in a secure, efficient and user-friendly way that involves cryp...
Marie Babel, Olivier Déforges, Laurent B&ea...
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
13 years 11 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
ICDCS
1996
IEEE
13 years 10 months ago
Route Optimization and Location Updates for Mobile Hosts
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...
Weidong Chen, Eric C. Lin