Sciweavers

14824 search results - page 2465 / 2965
» Security - Introduction
Sort
View
ICIP
2008
IEEE
16 years 6 months ago
Principal Component Analysis of spectral coefficients for mesh watermarking
This paper proposes a new robust 3-D object blind watermarking method using constraints in the spectral domain. Mesh watermarking in spectral domain has the property of spreading ...
Ming Luo, Adrian G. Bors
ICIP
2008
IEEE
16 years 6 months ago
Adaptive decoding for halftone orientation-based data hiding
Halftone image watermarking techniques that allow automated extraction of the embedded watermark data are useful in a variety of document security and workflow applications. The p...
Orhan Bulan, Gaurav Sharma, Vishal Monga
ICIP
2008
IEEE
16 years 6 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
16 years 6 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
ICIP
2007
IEEE
16 years 6 months ago
Three Dimensional Face Recognition using Wavelet Decomposition of Range Images
Interest in face recognition systems has increased significantly due to the emergence of significant commercial opportunities in surveillance and security applications. In this pa...
Sina Jahanbin, Hyohoon Choi, Alan C. Bovik, Kennet...
« Prev « First page 2465 / 2965 Last » Next »