Sciweavers

856 search results - page 26 / 172
» An Adaptive Steganographic Method Using Additive Noise
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 11 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
ISCAS
2011
IEEE
248views Hardware» more  ISCAS 2011»
14 years 9 months ago
SNR measurement based on linearity test for ADC BIST
—Linearity and spectral performance test contributes most cost of ADC test. This paper presents a new method for testing an ADC’s SNR from its linearity test data. The method d...
Jingbo Duan, Degang Chen
151
Voted
ICIP
2005
IEEE
16 years 7 months ago
Image restoration using a hybrid combination of particle filtering and wavelet denoising
In this paper we propose a novel image restoration method that effectively combines a particle filter with wavelet shrinkage to achieve robust performance against inhomogeneous no...
Yan Zhai, Mark B. Yeary, Victor E. DeBrunner, Jose...
ICIP
1995
IEEE
15 years 9 months ago
Multi-channel restoration of electron micrographs
We introduce a projection based multi-channel restoration method which is useful in cases for which there is no a priori information about the input signal. The method is especial...
M. Vrhel, B. L. Trus
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 6 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries