Sciweavers

103 search results - page 2 / 21
» Visible or invisible links
Sort
View
ICMCS
2006
IEEE
185views Multimedia» more  ICMCS 2006»
13 years 11 months ago
Lossless Visible Watermarking
The embedding distortion of visible watermarking is usually larger than that of invisible watermarking. In order to maintain the signal fidelity after the watermark extraction, â€...
Shu-Kei Yip, Oscar C. Au, Chi-Wang Ho, Hoi-Ming Wo...
ICIP
2010
IEEE
13 years 3 months ago
Invisible light: Using infrared for video conference relighting
Desktop video conferencing often suffers from bad lighting, which may be caused by harsh shadowing, saturated regions, etc. The primary reason for this is the lack of control over...
Prabath Gunawardane, Thomas Malzbender, Ramin Sama...
PODS
2007
ACM
104views Database» more  PODS 2007»
14 years 5 months ago
XML transformation by tree-walking transducers with invisible pebbles
The pebble tree automaton and the pebble tree transducer are enhanced by additionally allowing an unbounded number of `invisible' pebbles (as opposed to the usual `visible�...
Joost Engelfriet, Hendrik Jan Hoogeboom, Bart Samw...
ACMDIS
2010
ACM
13 years 3 months ago
Designing for the invisible: user-centered design of infrastructure awareness systems
Infrastructure awareness systems reveal invisible aspects of infrastructures to their existing or potential users. Designing such systems is challenging as it requires making visi...
Juan David Hincapié-Ramos, Aurélien ...
ICIP
2000
IEEE
14 years 7 months ago
Securing Images Online: A Protection Mechanism That Does Not Involve Watermarking
The paper covers a method of allowing a client to browse an image to examine it in detail, while making it difficult to steal. It differs from invisible watermarking methods in th...
Cormac Herley