Sciweavers

262 search results - page 47 / 53
» DWT-DCT-SVD based watermarking
Sort
View
TMM
2010
143views Management» more  TMM 2010»
14 years 4 months ago
A Comparison of Perceptually-Based Metrics for Objective Evaluation of Geometry Processing
Recent advances in 3D graphics technologies have led to an increasing use of processing techniques on 3D meshes, such as filtering, compression, watermarking, simplification, defor...
Guillaume Lavoué, Massimiliano Corsini
ICIP
2004
IEEE
15 years 11 months ago
Redundant image representations in security applications
To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of no...
Philippe Jost, Pierre Vandergheynst, Pascal Frossa...
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
15 years 3 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
DRMTICS
2005
Springer
15 years 3 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov
ICIP
2006
IEEE
15 years 11 months ago
A Model for the Electronic Representation of Bank Checks
The substitution of physical bank check exchange by electronic check image transfer brings agility, security and cost reduction to the clearing system. In this paper, we propose a...
Danilo Dias, Ricardo L. de Queiroz