Sciweavers

3527 search results - page 395 / 706
» Gaussianization
Sort
View
ISM
2006
IEEE
93views Multimedia» more  ISM 2006»
15 years 9 months ago
Worst Case Attack on Quantization Based Data Hiding
Currently, most quantization based data hiding algorithms are built assuming specific distributions of attacks, such as additive white Gaussian noise (AWGN), uniform noise, and s...
Ning Liu, K. P. Subbalakshmi
119
Voted
ISM
2006
IEEE
150views Multimedia» more  ISM 2006»
15 years 9 months ago
Blind Detection for Additive Embedding Using Underdetermined ICA
This paper presents an efficient blind watermark detection scheme for additive embedding (AE) based on underdetermined independent component analysis (ICA) framework. The propose...
Hafiz Malik, Ashfaq A. Khokhar, Rashid Ansari, Mar...
VTC
2006
IEEE
15 years 9 months ago
Accurate BER Analysis of Asynchronous DS-CDMA Systems in Ricean Channels
— The accurate Bit Error Rate (BER) calculation of an asynchronous Ricean-faded DS-CDMA system using random spreading sequences and BPSK modulation is studied in this paper. A ne...
Xiang Liu, Lajos Hanzo
ACCV
2006
Springer
15 years 9 months ago
Smooth Foreground-Background Segmentation for Video Processing
Abstract. We propose an efficient way to account for spatial smoothness in foreground-background segmentation of video sequences. Most statistical background modeling techniques re...
Konrad Schindler, Hanzi Wang
WOWMOM
2006
ACM
122views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
Multiple-Access Insights from Bounds on Sensor Localization
In this paper, we build on known bounds on localization in sensor networks and provide new insights that can be used in multiple-access design from a localization perspective. Spe...
Swaroop Venkatesh, R. Michael Buehrer