In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Current Personal Digital Assistants (PDAs) such as Pocket PCs provide little support for sketching. This is due, no doubt, to the limited screen size and relatively poor resolutio...
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
In this paper, we first provide a joint source and channel coding (JSCC) approach in estimating Gaussian sources over Gaussian MAC channels, as well as its sufficient and necessary...
Shuangqing Wei, Rajgopal Kannan, S. Sitharama Iyen...
In the image plane, a 3 Dimensional movement of planar rigid object can be represented satisfactory by an affine motion of his boundary (the exterior contour) which we assume to b...