Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
This paper presents an efficient blind watermark detection/decoding scheme for spread spectrum (SS) based watermarking, exploiting the fact that in SS-based embedding schemes the ...
Abstract. An important assessment in patients with ischemic heart disease is whether myocardial contractility may improve after treatment. The prediction of myocardial contractilit...
Avan Suinesiaputra, Alejandro F. Frangi, Hildo J. ...
Independent component analysis (ICA) has been applied in many fields of signal processing and many ICA learning algorithms have been proposed from different perspectives. However...
: Most of published audio watermark algorithms are suffered a trade-off between inaudibility and detectibility, and the detection performance depends greatly on the strength of noi...
Thuong Le-Tien, Dien Vo-Ngoc, Lan Ngo-Hoang, Sung ...