Sciweavers

1717 search results - page 105 / 344
» Error concealment using a diffusion based method
Sort
View
152
Voted
ISCAS
2003
IEEE
185views Hardware» more  ISCAS 2003»
15 years 8 months ago
A semi-fragile object based video authentication system
This paper presents a semi-fragile object-based authentication solution for MPEG4 video. To protect the integrity of the video objects / sequences, a content-based watermark is em...
Dajun He, Qibin Sun, Qi Tian
142
Voted
ICANN
2011
Springer
14 years 6 months ago
Learning Curves for Gaussian Processes via Numerical Cubature Integration
This paper is concerned with estimation of learning curves for Gaussian process regression with multidimensional numerical integration. We propose an approach where the recursion e...
Simo Särkkä
125
Voted
SIAMSC
2008
140views more  SIAMSC 2008»
15 years 2 months ago
Compact Fourier Analysis for Designing Multigrid Methods
The convergence of Multigrid methods can be analyzed based on a Fourier analysis of the method or by proving certain inequalities that have to be fulfilled by the smoother and by t...
Thomas K. Huckle
ICIP
2008
IEEE
16 years 4 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
109
Voted
ICCAD
2004
IEEE
80views Hardware» more  ICCAD 2004»
15 years 11 months ago
Techniques for improving the accuracy of geometric-programming based analog circuit design optimization
We present techniques for improving the accuracy of geometric-programming (GP) based analog circuit design optimization. We describe major sources of discrepancies between the res...
Jintae Kim, Jaeseo Lee, Lieven Vandenberghe