Sciweavers

571 search results - page 28 / 115
» Locating and Correcting Errors in Images
Sort
View
ICIP
2008
IEEE
15 years 11 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
SIGSOFT
2008
ACM
15 years 10 months ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren
3DPVT
2006
IEEE
171views Visualization» more  3DPVT 2006»
15 years 3 months ago
Image Based Localization in Urban Environments
In this paper we present a prototype system for image based localization in urban environments. Given a database of views of city street scenes tagged by GPS locations, the system...
Wei Zhang, Jana Kosecka
IWDW
2005
Springer
15 years 3 months ago
Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information
In a fingerprinting scheme a distributor places marks in each copy of a digital object. Placing different marks in different copies, uniquely identifies the recipient of each cop...
Miguel Soriano, Marcel Fernandez, Josep Cotrina Na...
PAMI
2000
127views more  PAMI 2000»
14 years 9 months ago
Geometric Camera Calibration Using Circular Control Points
Modern CCD cameras are usually capable of a spatial accuracy greater than 1/50 of the pixel size. However, such accuracy is not easily attained due to various error sources that c...
Janne Heikkilä