Sciweavers

1877 search results - page 183 / 376
» A new method for bottleneck detection
Sort
View
ACSAC
2007
IEEE
15 years 5 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
ISCAS
2005
IEEE
197views Hardware» more  ISCAS 2005»
15 years 4 months ago
Averaging attack resilient video fingerprinting
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
ICIP
2003
IEEE
16 years 18 days ago
Improved fingercode for filterbank-based fingerprint matching
FingerCode has been shown to be an effective representation to capture both the local and global information in a fingerprint. However, the performance of FingerCode is influenced...
Lifeng Sha, Feng Zhao, Xiaoou Tang
IWDW
2004
Springer
15 years 4 months ago
Alteration-Locating Authentication Watermarking for Binary Images
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Hae Yong Kim, Ricardo L. de Queiroz
71
Voted
ICASSP
2010
IEEE
14 years 11 months ago
Joint estimate of shape and time-synchronization of a glottal source model by phase flatness
A new method is proposed to jointly estimate the shape parameter of a glottal model and its time position in a voiced segment. We show that, the idea of phase flatness (or phase ...
Gilles Degottex, Axel Röbel, Xavier Rodet