Sciweavers

101 search results - page 14 / 21
» Extended visual cryptography schemes
Sort
View
3DPVT
2006
IEEE
169views Visualization» more  3DPVT 2006»
15 years 1 months ago
Qualitative Characterization of Deforming Surfaces
This paper extends the idea of classification schemes for static surface curvature into the temporal domain. We seek to identify regions in sequences of depth data that exhibit va...
T. C. Lukins, R. B. Fisher
TIP
2002
143views more  TIP 2002»
14 years 9 months ago
Adaptive image coding with perceptual distortion control
This paper presents a discrete cosine transform (DCT)-based locally adaptive perceptual image coder, which discriminates between image components based on their perceptual relevanc...
Ingo S. Hontsch, Lina J. Karam
WSNA
2003
ACM
15 years 2 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
ICIP
2003
IEEE
15 years 11 months ago
Spread transform watermarking for video sources
Spread Transform (ST) is a quantization watermarking algorithm in which vectors of the wavelet coefficients of a host work are quantized, using one of two dithered quantizers, to ...
John Earl, Nick G. Kingsbury
IROS
2007
IEEE
128views Robotics» more  IROS 2007»
15 years 3 months ago
Exploiting similarities for robot perception
— A cognitive robot system has to acquire and efficiently store vast knowledge about the world it operates in. To cope with every day tasks, a robot needs to learn, classify and...
Kai Welke, Erhan Oztop, Gordon Cheng, Rüdiger...