Sciweavers

3130 search results - page 14 / 626
» Collusion without communication
Sort
View
ICIP
2001
IEEE
16 years 1 months ago
Geometric hashing techniques for watermarking
In this paper we introduce the idea of using Computer Vision techniques for improving and enhancing watermarking capabilities. Specifically, we incorporate Geometric Hashing techn...
Hagit Zabrodsky Hel-Or, Y. Yitzhaki, Yacov Hel-Or
ICMCS
2008
IEEE
174views Multimedia» more  ICMCS 2008»
15 years 6 months ago
Blind motion-compensated video watermarking
The temporal correlation between adjacent video frames poses a severe challenges for video watermarking applications. Motioncoherent watermarking has been recognized as a strategy...
Peter Meerwald, Andreas Uhl
ATAL
2005
Springer
15 years 5 months ago
Reciprocal resource sharing in P2P environments
Peer-to-peer (P2P) systems enable users to share resources in a networked environment without worrying about issues such as scalability and load balancing. Unlike exchange of good...
Dipyaman Banerjee, Sabyasachi Saha, Sandip Sen, Pr...
IPTPS
2003
Springer
15 years 5 months ago
Enforcing Fair Sharing of Peer-to-Peer Resources
Cooperative peer-to-peer applications are designed to share the resources of each computer in an overlay network for the common good of everyone. However, users do not necessarily...
Tsuen-Wan Ngan, Dan S. Wallach, Peter Druschel
PIMRC
2008
IEEE
15 years 6 months ago
A coherent amplify-and-forward relaying demonstrator without global phase reference
ACT In this work we present a demonstrator for coherent linear amplify-and-forward (AF) relaying. Two source/destination pairs communicate with the help of three half-duplex relays...
Stefan Berger, Armin Wittneben