Sciweavers

2327 search results - page 289 / 466
» Secure Image Filtering
Sort
View
127
Voted
VIP
2001
15 years 3 months ago
Web-based Image Authentication Using Invisible Fragile Watermark
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret i...
Yusuk Lim, Changsheng Xu, David Dagan Feng
BMCBI
2006
132views more  BMCBI 2006»
15 years 1 months ago
Comprehensive quality control utilizing the prehybridization third-dye image leads to accurate gene expression measurements by c
Background: Gene expression profiling using microarrays has become an important genetic tool. Spotted arrays prepared in academic labs have the advantage of low cost and high desi...
Xujing Wang, Shuang Jia, Lisa Meyer, Bixia Xiang, ...
ICIP
2003
IEEE
16 years 3 months ago
Halftone visual cryptography
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...
Z. Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo
BMCBI
2010
156views more  BMCBI 2010»
15 years 1 months ago
Extended morphological processing: a practical method for automatic spot detection of biological markers from microscopic images
Background: A reliable extraction technique for resolving multiple spots in light or electron microscopic images is essential in investigations of the spatial distribution and dyn...
Yoshitaka Kimori, Norio Baba, Nobuhiro Morone
PCM
2004
Springer
116views Multimedia» more  PCM 2004»
15 years 7 months ago
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme
Recently, Yen and Guo proposed a chaotic neural network (CNN) for signal encryption, which was suggested as a solution for protection of digital images and videos. The present pape...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen