Sciweavers

977 search results - page 142 / 196
» Secret image sharing
Sort
View
HICSS
2005
IEEE
125views Biometrics» more  HICSS 2005»
15 years 5 months ago
Virtual Microscopy: Potential Applications in Medical Education and Telemedicine in Countries with Developing Economies
We evaluated the diagnostic accuracy of a virtual microscopy setup using surgical pathology specimens commonly encountered in a university hospital setting. The high quality image...
Paul A. Fontelo, Ernest DiNino, Krista Johansen, A...
IH
2005
Springer
15 years 5 months ago
Efficient Wet Paper Codes
Abstract. Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipien...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
IBPRIA
2003
Springer
15 years 5 months ago
Incrementally Assessing Cluster Tendencies with a Maximum Variance Cluster Algorithm
A straightforward and efficient way to discover clustering tendencies in data using a recently proposed Maximum Variance Clustering algorithm is proposed. The approach shares the ...
Krzysztof Rzadca, Francesc J. Ferri
CORR
2008
Springer
76views Education» more  CORR 2008»
14 years 12 months ago
The Good, the Bad, and the Ugly: three different approaches to break their watermarking system
The Good is Blondie, a wandering gunman with a strong personal sense of honor. The Bad is Angel Eyes, a sadistic hitman who always hits his mark. The Ugly is Tuco, a Mexican bandi...
Gaëtan Le Guelvouit, Teddy Furon, Franç...
ICIP
2007
IEEE
16 years 1 months ago
Motion-Based Geometry Compensation for DWT Compression of 3D mesh Sequences
In this paper, We propose an efficient compression method to encode the geometry of 3D mesh sequences of objects sharing the same connectivity. Our approach is based on the cluste...
Yasmine Boulfani-Cuisinaud, Marc Antonini