Sciweavers

7084 search results - page 1166 / 1417
» Hiding Information in Images
Sort
View
ACMACE
2005
ACM
15 years 7 months ago
SymBall: camera driven table tennis for mobile phones
We present a table tennis game concept, implemented for Symbian OS/Series 60 mobile phones, using the phone's integrated camera as the main game controller. The game demonstr...
Mika Hakkarainen, Charles Woodward
DAGM
2005
Springer
15 years 7 months ago
Multi-lingual and Multi-modal Speech Processing and Applications
Over the last decade voice technologies for telephony and embedded solutions became much more mature, resulting in applications providing mobile access to digital information from ...
Jozef Ivanecký, Julia Fischer, Marion Mast,...
GW
2005
Springer
120views Biometrics» more  GW 2005»
15 years 7 months ago
Recognition of Deictic Gestures for Wearable Computing
In modern society there is an increasing demand to access, record and manipulate large amounts of information. This has inspired a new approach to thinking about and designing pers...
Thomas B. Moeslund, Lau Nørgaard
IH
2005
Springer
15 years 7 months ago
A General Framework for Structural Steganalysis of LSB Replacement
There are many detectors for simple Least Significant Bit (LSB) steganography in digital images, the most sensitive of which make use of structural or combinatorial properties of ...
Andrew D. Ker
IWDW
2005
Springer
15 years 7 months ago
A Survey of Watermarking Security
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
Teddy Furon
« Prev « First page 1166 / 1417 Last » Next »