We proposed a blind watermarking technique to embed the watermark in JPEG compressed domain. Low frequency DCT coefficients are extracted to form an M-dimensional vector. Watermar...
This paper presents an efficient Real-Time method for detecting moving objects in unconstrained environments, using a background subtraction technique. A new background model that...
Ariel Amato, Mikhail Mozerov, Ivan Huerta Casado, ...
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
In a Grid computing environment, resources are shared among a large number of applications. Brokers and schedulers find matching resources and schedule the execution of the applic...
Seyed Masoud Sadjadi, Shu Shimizu, Javier Figueroa...
We describe here a methodology to combine two different techniques for Semantic Relation Extraction from texts. On the one hand, generic lexicosyntactic patterns are applied to the...