Sciweavers

14824 search results - page 2466 / 2965
» Security - Introduction
Sort
View
ICIP
2007
IEEE
16 years 6 months ago
Lossless Image Compression and Selective Encryption using a Discrete Radon Transform
In this paper we propose a new joint encryption and lossless compression technique designed for large images 1 . The proposed technique takes advantage of the Mojette transform pr...
Andrew Kingston, Simone Colosimo, Patrizio Campisi...
133
Voted
ICIP
2006
IEEE
16 years 6 months ago
Phase Distortion Correction for See-Through-The-Wall Imaging Radar
See Through The Wall (STTW) applications have become of high importance to law enforcement, homeland security and defense needs. In this work surface penetrating radar is simulate...
Jay A. Marble, Alfred O. Hero
ICIP
2004
IEEE
16 years 6 months ago
A blind cdma image watermarking scheme in wavelet domain
The paper proposes a blind spread spectrum watermarking scheme where watermark information is embedded redundantly in the multilevel wavelet coefficients of the cover image. It ha...
Santi P. Maity, Malay Kumar Kundu
185
Voted
ICIP
2003
IEEE
16 years 6 months ago
Halftone visual cryptography
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...
Z. Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo
ICIP
2001
IEEE
16 years 6 months ago
Use of neural networks for behaviour understanding in railway transport monitoring applications
In the last years, the interest for advanced video-based surveillance applications is more and more growing. This is especially true in the field of railway urban transport where ...
Claudio Sacchi, Carlo S. Regazzoni, Gianluca Gera,...
« Prev « First page 2466 / 2965 Last » Next »