Sciweavers

3898 search results - page 185 / 780
» On the Bit Extraction Problem
Sort
View
JMM2
2008
130views more  JMM2 2008»
15 years 2 months ago
A Robust Image Watermarking Scheme using Singular Value Decomposition
This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as `l...
B. Chandra Mohan, S. Srinivas Kumar
TWC
2008
172views more  TWC 2008»
15 years 2 months ago
A Software-Defined Radio System for Backscatter Sensor Networks
Backscatter radio is proposed for sensor networks. In that way, the transmitter for each sensor is simplified to a transistor connected to an antenna and therefore, the cost for ea...
Giovanni Vannucci, Aggelos Bletsas, Darren Leigh
ICMCS
2009
IEEE
130views Multimedia» more  ICMCS 2009»
15 years 20 days ago
On improving the collision property of robust hashing based on projections
In this paper, we study the collision property of one of the robust hash functions proposed in [1]. This method was originally proposed for robust hash generation from blocks of i...
Regunathan Radhakrishnan, Wenyu Jiang, Claus Bauer
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 10 months ago
Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images
This paper proposes a strict authentication watermarking for medical images. In this scheme, we define region of interest (ROI) by taking the smallest rectangle around an image. T...
Jasni Mohamad Zain
INFOCOM
2011
IEEE
14 years 6 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim