Sciweavers

560 search results - page 77 / 112
» Robust Mesh Watermarking
Sort
View
75
Voted
JSCIC
2008
66views more  JSCIC 2008»
15 years 13 days ago
Mesh Redistribution Strategies and Finite Element Schemes for Hyperbolic Conservation Laws
In this work we consider a new class of Relaxation Finite Element schemes for Conservation Laws, with more stable behavior on the limit area of the relaxation parameter. Combine t...
Christos Arvanitis
ICC
2009
IEEE
135views Communications» more  ICC 2009»
15 years 7 months ago
Tracing Stateful Pirate Decoders
Abstract— Most traitor tracing schemes in the literature assume that pirate decoders are stateless. This stateless assumption, however, is unrealistic especially in case of hardw...
Yongdong Wu, Feng Bao, Ying Qiu
112
Voted
IIHMSP
2006
IEEE
124views Multimedia» more  IIHMSP 2006»
15 years 6 months ago
Design of Collusion-Free Codes Based on MAI-Free Principle
The design of collusion-free codes for data hiding systems is investigated, and two new collusion-free codes are proposed in this work. They are called the Orthogonal Spreading (O...
Byung-Ho Cha, C. C. Jay Kuo
90
Voted
SADFE
2005
IEEE
15 years 6 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
112
Voted
GRAPP
2007
15 years 1 months ago
Fitting 3D morphable models using implicit representations
We consider the problem of approximating the 3D scan of a real object through an affine combination of examples. Common approaches depend either on the explicit estimation of poi...
Curzio Basso, Alessandro Verri