Sciweavers

666 search results - page 32 / 134
» Fair watermarking techniques
Sort
View
ASPLOS
2010
ACM
15 years 1 months ago
Fairness via source throttling: a configurable and high-performance fairness substrate for multi-core memory systems
Cores in a chip-multiprocessor (CMP) system share multiple hardware resources in the memory subsystem. If resource sharing is unfair, some applications can be delayed significantl...
Eiman Ebrahimi, Chang Joo Lee, Onur Mutlu, Yale N....
ICIP
2005
IEEE
15 years 11 months ago
Redundant-wavelet watermarking with pixel-wise masking
An algorithm is presented which implements image watermarking in the domain of an overcomplete, or redundant, wavelet transform. This algorithm expands on a previous method which ...
Kristen M. Parker, James E. Fowler
IWDW
2004
Springer
15 years 3 months ago
Alteration-Locating Authentication Watermarking for Binary Images
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Hae Yong Kim, Ricardo L. de Queiroz
PCM
2001
Springer
110views Multimedia» more  PCM 2001»
15 years 2 months ago
A Synchronous Fragile Watermarking Scheme for Erroneous Q-DCT Coefficients Detection
In video communications over error introducing channels, error concealment techniques are widely applied in video decoder for good subjective images output. However, a damaged MB ...
Minghua Chen, Yun He
ICMCS
1999
IEEE
105views Multimedia» more  ICMCS 1999»
15 years 2 months ago
Key Independent Watermark Detection
Many types of pseudo-random signals have been used to embed signatures as watermarks, with spread spectrum signal techniques used to recover the signature from the encrypted data....
Ron G. van Schyndel, Andrew Z. Tirkel, Imants D. S...