Sciweavers

2327 search results - page 437 / 466
» Secure Image Filtering
Sort
View
ICIAR
2005
Springer
15 years 5 months ago
Digital Video Scrambling Using Motion Vector and Slice Relocation
As digitalized content rapidly proliferates in networked systems, content security necessarily arises as one of the most important issues. Many developers have studied techniques ...
Sang Gu Kwon, Woong Il Choi, Byeungwoo Jeon
IWANN
2005
Springer
15 years 5 months ago
Face Recognition System Based on PCA and Feedforward Neural Networks
Face recognition is one of the most important image processing research topics which is widely used in personal identification, verification and security applications. In this pape...
Alaa Eleyan, Hasan Demirel
IWDW
2005
Springer
15 years 5 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
MMSEC
2004
ACM
145views Multimedia» more  MMSEC 2004»
15 years 5 months ago
Improving LSB steganalysis using marginal and joint probabilistic distributions
The goal of steganalysis is to search for the presence of hidden information in numerical contents. This paper is based on a previous LSB steganalysis scheme for digital images th...
Benoit Roue, Patrick Bas, Jean-Marc Chassery
ISCIS
2004
Springer
15 years 5 months ago
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs a...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...