Sciweavers

1629 search results - page 90 / 326
» Infeasible Code Detection
Sort
View
ICIP
2008
IEEE
15 years 11 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
ICIP
2001
IEEE
15 years 11 months ago
Coding theoretic approach to image segmentation
This paper introduces multi-scale tree-based approaches to image segmentation, using Rissanen's coding theoretic minimum description length (MDL) principle to penalize overly...
Mário A. T. Figueiredo, Robert D. Nowak, Un...
ICC
2008
IEEE
15 years 4 months ago
Serial Search Based Code Acquisition in the Cooperative MIMO Aided DS-CDMA Downlink
— In this paper we investigate a realistic code acquisition assisted cooperative Non-Coherent (NC) Multiple-Input Multiple-Output (MIMO) DS-CDMA downlink scenario, when communica...
Seung Hwan Won, Kyungchun Lee, Lajos Hanzo
CRV
2009
IEEE
117views Robotics» more  CRV 2009»
15 years 2 months ago
Screen-Camera Calibration Using Gray Codes
In this paper we present a method for efficient calibration of a screen-camera setup, in which the camera is not directly facing the screen. A spherical mirror is used to make th...
Yannick Francken, Chris Hermans, Philippe Bekaert
GLOBECOM
2009
IEEE
15 years 1 months ago
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes
File distribution is becoming a key technology, in particular in large scale content broadcasting systems like DVBH/SH. They largely rely on Application Level FEC codes (ALFEC) in ...
Mathieu Cunche, Vincent Roca