Sciweavers

603 search results - page 54 / 121
» Embedded Formulas Extraction
Sort
View
137
Voted
IH
2007
Springer
15 years 10 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
CRV
2006
IEEE
155views Robotics» more  CRV 2006»
15 years 10 months ago
Collaborative Multi-Camera Surveillance with Automated Person Detection
This paper presents the groundwork for a distributed network of collaborating, intelligent surveillance cameras, implemented with low-cost embedded microprocessor camera modules. ...
Trevor Ahmedali, James J. Clark
ICMCS
2006
IEEE
124views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Video Watermarking Based on Neural Networks
In this paper, we propose a novel digital video watermarking scheme based on multi resolution motion estimation and artificial neural network. A multi resolution motion estimation...
Maher El'arbi, Chokri Ben Amar, Henri Nicolas
152
Voted
IWDW
2004
Springer
15 years 10 months ago
A Multi-feature Based Invertible Authentication Watermarking for JPEG Images
: Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this p...
Deng-Pan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang
HPCA
1996
IEEE
15 years 8 months ago
Co-Scheduling Hardware and Software Pipelines
Exploiting instruction-level parallelism (ILP) is extremely important for achieving high performance in application specific instruction set processors (ASIPs) and embedded process...
Ramaswamy Govindarajan, Erik R. Altman, Guang R. G...