Sciweavers

2007 search results - page 52 / 402
» SPECTRUM
Sort
View
90
Voted
IH
2005
Springer
15 years 6 months ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...
102
Voted
GLOBECOM
2007
IEEE
15 years 4 months ago
Bursty Traffic in Energy-Constrained Opportunistic Spectrum Access
We design opportunistic spectrum access strategies for improving spectrum efficiency. In each slot, a secondary user chooses a subset of channels to sense and decides whether to ac...
Yunxia Chen, Qing Zhao, Ananthram Swami
GLOBECOM
2009
IEEE
15 years 4 months ago
A Framework of Multiplicative Spread Spectrum Embedding for Data Hiding: Performance, Decoder and Signature Design
In this paper, we have investigated several aspects of multiplicative spread spectrum (MSS) embedding for Data Hiding. First, we analyze the probability of error of the maximum lik...
Amir Valizadeh, Z. Jane Wang
135
Voted
IMAMS
2003
212views Mathematics» more  IMAMS 2003»
15 years 1 months ago
Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis
Watermarking is to embed a structure called a watermark into the target data such as images. The watermark can be used, for example, in order to secure the copyright and detect tam...
Kohei Muratani, Kokichi Sugihara
109
Voted
CORR
2010
Springer
186views Education» more  CORR 2010»
15 years 20 days ago
Cooperative Sequential Spectrum Sensing Algorithms for OFDM
This paper considers the problem of spectrum sensing in cognitive radio networks when the primary user is using Orthogonal Frequency Division Multiplexing (OFDM). For this we devel...
ArunKumar Jayaprakasam, Vinod Sharma, Chandra R. M...