Sciweavers

ICASSP
2009
IEEE
13 years 11 months ago
A modified distortion metric for audio coding
Current audio coding standards employ the modified discrete cosine transform (MDCT) where overlapped frames of audio are windowed and transformed to the frequency domain. Encodin...
Vinay Melkote, Kenneth Rose
ICCD
2000
IEEE
87views Hardware» more  ICCD 2000»
14 years 1 months ago
A Register File with Transposed Access Mode
We introduce a new register file architecture that provides both row-wise and column-wise accesses, thus allowing partitioned instructions to be used in columnwise processing with...
Yoochang Jung, Stefan G. Berg, Donglok Kim, Yongmi...
ICPR
2000
IEEE
14 years 5 months ago
On Holographic Transform Compression of Images
: Lossy transform compression of images is successful and widespread. The JPEG standard uses the discrete cosine transform on blocks of the image and a bit allocation process that ...
Alfred M. Bruckstein, Robert J. Holt, Arun N. Netr...
ICPR
2004
IEEE
14 years 6 months ago
Multiblock-Fusion Scheme for Face Recognition
A multiblock-fusion scheme for face recognition is proposed in this paper. Three face recognition algorithms, i.e. probabilistic match, Linear Discriminant Analysis (LDA) and Disc...
Rolf-Rainer Grigat, Shuyan Zhao
ICPR
2006
IEEE
14 years 6 months ago
Motion-Based Handwriting Recognition for Mobile Interaction
This paper presents a new interaction technique for camera-enabled mobile devices. The handheld device can be used for writing just by moving the device. In our method, interframe...
Janne Heikkilä, Jari Hannuksela, Pekka Sangi
ICIP
2001
IEEE
14 years 6 months ago
Turbo coding for sample-level watermarking in the DCT domain
Coding at the sample level in still image watermarking takes advantage of avoiding a non-optimum initial diversity stage, used in many watermarking systems for tailoring Gaussian ...
Fabiano Baldo, Federico Pérez Gonzál...
ICIP
2005
IEEE
14 years 6 months ago
Asymmetric spread spectrum data-hiding for Laplacian host data
Spread spectrum (SS) or known-host-statistics technique has shown the best performance in terms of both rate of reliable communications and bit error probability at the low waterm...
José-Emilio Vila-Forcén, Oleksiy J. ...
ICIP
2006
IEEE
14 years 6 months ago
Selective Encryption of Human Skin in JPEG Images
In this study we propose a new approach for selective encryption in the Huffman coding of the Discrete Cosine Transform (DCT) coefficients using the Advanced Encryption Standard (...
Adrian G. Bors, José M. Rodrigues, William ...
ICIP
2007
IEEE
14 years 6 months ago
Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation
We present a method to compute the steganographic capacity for images, with odd-even based hiding in the quantized discrete cosine transform domain. The method has been generalize...
Anindya Sarkar, B. S. Manjunath
ICIP
2008
IEEE
14 years 6 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...