Sciweavers

666 search results - page 44 / 134
» Fair watermarking techniques
Sort
View
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
15 years 3 months ago
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
Chun-Shien Lu, Chia-Mu Yu
IWDW
2005
Springer
15 years 3 months ago
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes...
Patrick Bas, Jarmo Hurri
SMI
2008
IEEE
101views Image Analysis» more  SMI 2008»
15 years 4 months ago
Fairing wireframes in industrial surface design
Wireframe is a modeling tool widely used in industrial geometric design. The term wireframe refers to two sets of curves, with the property that each curve from one set intersects...
Yu-Kun Lai, Yong-Jin Liu, Yu Zang, Shi-Min Hu
ICNP
2005
IEEE
15 years 3 months ago
Priority Pricing in Utility Fair Networks
This paper deals with a new pricing approach in utility fair networks, where the user’s application is associated with a utility function. We allow users to have concave as well...
Tobias Harks, Tobias Poschwatta
ASIACRYPT
2003
Springer
15 years 1 months ago
Untraceable Fair Network Payment Protocols with Off-Line TTP
A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchant...
Chih-Hung Wang