Sciweavers

2449 search results - page 215 / 490
» Tensor Embedding Methods
Sort
View
120
Voted
ICIP
2006
IEEE
16 years 4 months ago
Tamper-Localization Watermarking with Systematic Error Correcting Code
Abstract-- This paper presents an authentication watermarking method which can localize the tampering regions in fine granularity. Unlike the previous block-wise Tampering-Localiza...
Yongdong Wu
105
Voted
ICIP
2002
IEEE
16 years 4 months ago
Lossless authentication of MPEG-2 video
In authentication using watermarking, the original media needs to be slightly modified in order to embed a short media digest in the media itself. Lossless authentication watermar...
Jiri Fridrich, Rui Du
136
Voted
ICDM
2008
IEEE
121views Data Mining» more  ICDM 2008»
15 years 9 months ago
Unifying Unknown Nodes in the Internet Graph Using Semisupervised Spectral Clustering
Most research on Internet topology is based on active measurement methods. A major difficulty in using these tools is that one comes across many unresponsive routers. Different m...
Anat Almog, Jacob Goldberger, Yuval Shavitt
ICPR
2008
IEEE
15 years 9 months ago
Remote multimodal biometric authentication using bit priority-based fragile watermarking
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
Tuan Hoang, Dat Tran, Dharmendra Sharma
113
Voted
MMSEC
2004
ACM
133views Multimedia» more  MMSEC 2004»
15 years 8 months ago
Data hiding on 3D polygonal meshes
This paper presents a high-capacity method to embed information into the geometry of a 3D polygonal mesh. The method extends a previously reported work, to which several improveme...
Yannick Maret, Touradj Ebrahimi