Sciweavers

3898 search results - page 184 / 780
» On the Bit Extraction Problem
Sort
View
SODA
2003
ACM
121views Algorithms» more  SODA 2003»
15 years 4 months ago
Competitiveness via consensus
We introduce the following consensus estimate problem. Several processors hold private and possibly different lower bounds on a value. The processors do not communicate with each ...
Andrew V. Goldberg, Jason D. Hartline
CHES
2009
Springer
192views Cryptology» more  CHES 2009»
16 years 3 months ago
CDs Have Fingerprints Too
Abstract. We introduce a new technique for extracting unique fingerprints from identical CDs. The proposed technique takes advantage of manufacturing variability found in the lengt...
Ghaith Hammouri, Aykutlu Dana, Berk Sunar
IWDW
2007
Springer
15 years 9 months ago
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack
Abstract. In this paper, we propose a practical real-time video watermarking scheme for downscaling attack. We embed watermark into an arbitrary size of a host video and extract it...
Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-K...
WISA
2005
Springer
15 years 8 months ago
Video Fingerprinting System Using Wavelet and Error Correcting Code
In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the ...
Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, H...
ACIVS
2006
Springer
15 years 4 months ago
A Real-Time Content Adaptation Framework for Exploiting ROI Scalability in H.264/AVC
In many application scenarios, the use of Regions of Interest (ROIs) within video sequences is a useful concept. It is shown in this paper how Flexible Macroblock Ordering (FMO), d...
Peter Lambert, Davy De Schrijver, Davy Van Deursen...