The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
In this simulation we demonstrate how real-time multiresolution approaches based on underlying geometries are used in terrain visualization. The animated sequence demonstrates app...
— QoS signaling protocol is one of the key components in Internet QoS architectures to establish, maintain, and remove reservation states in network nodes. This paper gives an ov...
—This paper investigates the feasibility of watermark embedding in the discrete cosine transform (DCT) domain for binary images. Watermark embedding is known difficult for binar...
Haiping Lu, Xuxia Shi, Yun Q. Shi, Alex C. Kot, Li...
In this study, the problem of updating a printer characterization in response to systematic changes in print-device characteristics is addressed with two distinct approaches: the ...