Sciweavers

4021 search results - page 778 / 805
» Watermarking 3D models
Sort
View
VLDB
2004
ACM
100views Database» more  VLDB 2004»
15 years 5 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
15 years 1 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 11 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin

Book
9504views
16 years 9 months ago
The OpenGL Programming Guide - The Redbook
"The OpenGL Programming Guide, Fifth Edition, provides definitive and comprehensive information on OpenGL and the OpenGL Utility Library. The previous edition covered OpenGL t...
Dave Shreiner, Mason Woo, Jackie Neider, Tom Davis
VIS
2007
IEEE
157views Visualization» more  VIS 2007»
16 years 1 months ago
Surface Extraction from Multi-Material Components for Metrology using Dual Energy CT
Abstract-- This paper describes a novel method for creating surface models of multi-material components using dual energy computed tomography (DECT). The application scenario is me...
Christoph Heinzl, Johann Kastner, Eduard Grölle...