Sciweavers

540 search results - page 85 / 108
» A New Compression Method for Compressed Matching
Sort
View
TCSV
2008
150views more  TCSV 2008»
14 years 9 months ago
Robust Video Fingerprinting for Content-Based Video Identification
Video fingerprints are feature vectors that uniquely characterize one video clip from another. The goal of video fingerprinting is to identify a given video query in a database (DB...
Sunil Lee, Chang Dong Yoo
JEI
2008
129views more  JEI 2008»
14 years 8 months ago
Removable visible image watermarking algorithm in the discrete cosine transform domain
Abstract. A removable visible watermarking scheme, which operates in the discrete cosine transform (DCT) domain, is proposed for combating copyright piracy. First, the original wat...
Ying Yang, Xingming Sun, Hengfu Yang, Chang-Tsun L...
SIGMOD
2000
ACM
129views Database» more  SIGMOD 2000»
15 years 2 months ago
Mining Frequent Patterns without Candidate Generation
Mining frequent patterns in transaction databases, time-series databases, and many other kinds of databases has been studied popularly in data mining research. Most of the previous...
Jiawei Han, Jian Pei, Yiwen Yin
CAD
2008
Springer
14 years 9 months ago
Improved Binary Space Partition merging
This paper presents a new method for evaluating boolean set operations between Binary Space Partition (BSP) trees. Our algorithm has many desirable features including both numeric...
Mikola Lysenko, Roshan D'Souza, Ching-Kuan Shene
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 3 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...