Sciweavers

3899 search results - page 36 / 780
» Robust Image Hashing
Sort
View
SIBGRAPI
2007
IEEE
15 years 4 months ago
Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions
This paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message ex...
Hae Yong Kim, Joceli Mayer
JMM2
2008
130views more  JMM2 2008»
14 years 9 months ago
A Robust Image Watermarking Scheme using Singular Value Decomposition
This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as `l...
B. Chandra Mohan, S. Srinivas Kumar
IH
2007
Springer
15 years 3 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
TELETRAFFIC
2007
Springer
15 years 3 months ago
Estimating Churn in Structured P2P Networks
In structured peer-to-peer (P2P) networks participating peers can join or leave the system at arbitrary times, a process which is known as churn. Many recent studies revealed that ...
Andreas Binzenhöfer, Kenji Leibnitz
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
15 years 3 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang