Sciweavers

146 search results - page 25 / 30
» Enhance Performance of Secure Image Using Wavelet Compressio...
Sort
View
ICIP
2007
IEEE
15 years 11 months ago
A Composite Approach for Blind Grayscale Logo Watermarking
This paper presents a composite blind digital watermarking technique, CompMark, to hide a visually meaningful grayscale logo in a host image. The multi-resolution fusion principle...
Elliot First, Xiaojun Qi
FGCN
2008
IEEE
173views Communications» more  FGCN 2008»
15 years 3 months ago
Performance Analysis of Hybrid Fingerprint Matching Methods
The fingerprint verification methods include minutiae-based and image-based methods. The minutiae-based method has been frequently used, but it has limitations in performance. Thes...
Jong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung B...
SIGGRAPH
1999
ACM
15 years 1 months ago
LCIS: A Boundary Hierarchy for Detail-Preserving Contrast Reduction
High contrast scenes are difficult to depict on low contrast displays without loss of important fine details and textures. Skilled artists preserve these details by drawing scen...
Jack Tumblin, Greg Turk
CCP
2011
92views more  CCP 2011»
13 years 9 months ago
Backwards Search in Context Bound Text Transformations
—The Burrows-Wheeler Transform (BWT) is the basis for many of the most effective compression and selfindexing methods used today. A key to the versatility of the BWT is the abili...
Matthias Petri, Gonzalo Navarro, J. Shane Culpeppe...
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Video Analysis and Compression on the STI Cell Broadband Engine Processor
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...