Sciweavers

2327 search results - page 290 / 466
» Secure Image Filtering
Sort
View
IH
2007
Springer
15 years 7 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quanti...
Luis Pérez-Freire, Fernando Pérez-Go...
IWDW
2005
Springer
15 years 7 months ago
A Survey of Watermarking Security
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
Teddy Furon
FC
1998
Springer
164views Cryptology» more  FC 1998»
15 years 6 months ago
Robustness and Security of Digital Watermarks
Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermark...
Lesley R. Matheson, Stephen G. Mitchell, Talal Sha...
ISBI
2006
IEEE
16 years 2 months ago
Automated super-resolution detection of fluorescent rods in 2D
We describe a method designed to detect fluorescent rods from 2D microscopy images. It is motivated by the desire to study the dynamics of bacteria such as Shigella. The methodolo...
Bo Zhang, Jost Enninga, Jean-Christophe Olivo-Mari...
EGH
2003
Springer
15 years 7 months ago
The FFT on a GPU
The Fourier transform is a well known and widely used tool in many scientific and engineering fields. The Fourier transform is essential for many image processing techniques, in...
Kenneth Moreland, Edward Angel