Sciweavers

130 search results - page 17 / 26
» A Robust Main-Memory Compression Scheme
Sort
View
ICIP
2002
IEEE
15 years 11 months ago
An automatic scheme for stereoscopic video object-based watermarking using qualified significant wavelet trees
In this paper a fully automatic system for embedding visually recognizable watermark patterns to video objects is proposed. The architecture consists of 3 main modules. During the...
Nikolaos D. Doulamis, Anastasios D. Doulamis, Stef...
CMS
2003
101views Communications» more  CMS 2003»
14 years 11 months ago
Watermark Security via Secret Wavelet Packet Subband Structures
Abstract. Wavelet packet decompositions generalize the classical pyramidal wavelet structure. We use the vast amount of possible wavelet packet decomposition structures to create a...
Werner Dietl, Andreas Uhl
83
Voted
ICASSP
2009
IEEE
15 years 4 months ago
Multiterminal source coding of Bernoulli-Gaussian correlated sources
This paper presents a practical coding scheme for the direct symmetric multiterminal source coding problem with remote source, when the noise between the remote source and the obs...
Francesca Bassi, Michel Kieffer, Çagatay Di...
83
Voted
CORR
2007
Springer
149views Education» more  CORR 2007»
14 years 9 months ago
Very fast watermarking by reversible contrast mapping
—Reversible contrast mapping (RCM) is a simple integer transform that applies to pairs of pixels. For some pairs of pixels, RCM is invertible, even if the least significant bits...
Dinu Coltuc, Jean-Marc Chassery
93
Voted
ICIP
2004
IEEE
15 years 11 months ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...