Sciweavers

2157 search results - page 123 / 432
» Binary ant algorithm
Sort
View
IWDW
2004
Springer
15 years 6 months ago
Alteration-Locating Authentication Watermarking for Binary Images
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Hae Yong Kim, Ricardo L. de Queiroz
ICIP
2004
IEEE
16 years 2 months ago
A public-key authentication watermarking for binary images
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
Hae Yong Kim, Ricardo L. de Queiroz
87
Voted
DCC
2008
IEEE
16 years 4 days ago
Edge local complementation and equivalence of binary linear codes
Abstract. Orbits of graphs under the operation edge local complementation (ELC) are defined. We show that the ELC orbit of a bipartite graph corresponds to the equivalence class of...
Lars Eirik Danielsen, Matthew G. Parker
ICASSP
2008
IEEE
15 years 7 months ago
Parametric estimation of affine deformations of binary images
We consider the problem of planar object registration on binary images where the aligning transformation is restricted to the group of affine transformations. Previous approaches...
Csaba Domokos, Zoltan Kato, Joseph M. Francos
ESOP
2004
Springer
15 years 6 months ago
Adaptive Pattern Matching on Binary Data
Pattern matching is an important operation in functional programs. So far, pattern matching has been investigated in the context of structured terms. This paper presents an approac...
Per Gustafsson, Konstantinos F. Sagonas