Sciweavers

1474 search results - page 114 / 295
» Computing in Memory Architectures for Digital Image Processi...
Sort
View
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 10 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
MVA
2007
155views Computer Vision» more  MVA 2007»
15 years 6 months ago
Pre-processing Algorithms on Digital Mammograms
Mammography is the best method for early mass detection. In order to limit the search for abnormalities by Computer Aided Diagnosis systems to the region of the breast without und...
Hengameh Mirzaalian, Mohammad Reza Ahmadzadeh, Sae...
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
15 years 10 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
149
Voted
ICIP
2001
IEEE
16 years 6 months ago
The curvelet transform for image denoising
We describe approximate digital implementations of two new mathematical transforms, namely, the ridgelet transform [3] and the curvelet transform [7, 6]. Our implementations offer...
Emmanuel J. Candès
CCS
2007
ACM
15 years 11 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu