Sciweavers

3898 search results - page 43 / 780
» On the Bit Extraction Problem
Sort
View
ICIP
2002
IEEE
15 years 11 months ago
Semi-fragile image authentication using generic wavelet domain features and ECC
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
Qibin Sun, Shih-Fu Chang
IEEEMSP
2002
IEEE
113views Multimedia» more  IEEEMSP 2002»
15 years 2 months ago
A minimum distortion data hiding technique for compressed images
We present a blind data hiding method for JPEG compressedimageswhichminimizesthe perceptualdistortion due to data embedding.The proposed systempresentsa number of op. tions to the ...
Cagatay Candan, Nikil Jayant

Publication
173views
16 years 8 months ago
A Comparison of Hashing Schemes for Address Lookup in Computer Networks
Using a trace of address references, we compared the efficiency of several different hashing functions, such as cyclic redundancy checking (CRC) polynomials, Fletcher checksum, fol...
R. Jain
EATCS
2002
141views more  EATCS 2002»
14 years 9 months ago
Recent Developments in Explicit Constructions of Extractors
Extractors are functions which are able to "extract" random bits from arbitrary distributions which "contain" sufficient randomness. Explicit constructions of ...
Ronen Shaltiel
APPROX
2009
Springer
118views Algorithms» more  APPROX 2009»
15 years 4 months ago
Hellinger Strikes Back: A Note on the Multi-party Information Complexity of AND
The AND problem on t bits is a promise decision problem where either at most one bit of the input is set to 1 (NO instance) or all t bits are set to 1 (YES instance). In this note...
T. S. Jayram