Sciweavers

3735 search results - page 55 / 747
» Order compression schemes
Sort
View
ICCAD
2007
IEEE
135views Hardware» more  ICCAD 2007»
15 years 9 months ago
A selective pattern-compression scheme for power and test-data reduction
— This paper proposes a selective pattern-compression scheme to minimize both test power and test data volume during scan-based testing. The proposed scheme will selectively supp...
Chia-Yi Lin, Hung-Ming Chen
106
Voted
ICIP
2003
IEEE
15 years 5 months ago
Joint source-channel coding scheme for image-in-image data hiding
We consider the problem of hiding images in images. In addition to the usual design constraints such as imperceptible host degradation and robustness in presence of variety of att...
Kaushal Solanki, Onkar Dabeer, B. S. Manjunath, Up...
ISCAS
2007
IEEE
143views Hardware» more  ISCAS 2007»
15 years 6 months ago
Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study
—In the implementation of a few JPEG steganographic schemes such as OutGuess and F5, an additional JPEG compression may take place before data embedding. The effect of this recom...
Yun Q. Shi, Chunhua Chen, Wen Chen, Maala P. Kaund...
100
Voted
JVCIR
2006
280views more  JVCIR 2006»
15 years 13 days ago
Error resiliency schemes in H.264/AVC standard
Real-time transmission of video data in network environments, such as wireless and Internet, is a challenging task, as it requires high compression efficiency and network friendly...
Sunil Kumar, Liyang Xu, Mrinal K. Mandal, Sethuram...
115
Voted
ICIP
2009
IEEE
14 years 10 months ago
A compressive-sensing based watermarking scheme for sparse image tampering identification
In this paper we describe a robust watermarking scheme for image tampering identification and localization. A compact representation of the image is first produced by assembling a...
Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tu...