Sciweavers

817 search results - page 125 / 164
» Robust Euclidean embedding
Sort
View
IIHMSP
2006
IEEE
124views Multimedia» more  IIHMSP 2006»
15 years 3 months ago
Design of Collusion-Free Codes Based on MAI-Free Principle
The design of collusion-free codes for data hiding systems is investigated, and two new collusion-free codes are proposed in this work. They are called the Orthogonal Spreading (O...
Byung-Ho Cha, C. C. Jay Kuo
ACSAC
2005
IEEE
15 years 3 months ago
Fault Attacks on Dual-Rail Encoded Systems
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
Jason Waddle, David Wagner
ICDAR
2005
IEEE
15 years 3 months ago
Image Analysis for Efficient Categorization of Image-based Spam E-mail
To circumvent prevalent text-based anti-spam filters, spammers have begun embedding the advertisement text in images. Analogously, proprietary information (such as source code) ma...
Hrishikesh Aradhye, Gregory K. Myers, James A. Her...
SADFE
2005
IEEE
15 years 3 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
15 years 3 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz