Sciweavers

3082 search results - page 179 / 617
» its 2004
Sort
View
123
Voted
ICIP
2004
IEEE
16 years 2 months ago
A public-key authentication watermarking for binary images
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
Hae Yong Kim, Ricardo L. de Queiroz
110
Voted
ICIP
2004
IEEE
16 years 2 months ago
Security evaluation for communication-friendly encryption of multimedia
This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption. Based on three atomic ...
Yinian Mao, Min Wu
ICIP
2004
IEEE
16 years 2 months ago
Reduced cross-discrimination for discriminative filters
Image template detection is usually a very important halfway step for a computational vision algorithm. A recently proposed approach for it involves the use of discriminative filt...
Alexandre Pimentel Mendonça, Eduardo A. B. ...
92
Voted
ICIP
2004
IEEE
16 years 2 months ago
Minimizing distortion for multi-path video streaming over ad hoc networks
We present a video distortion model analyzing the performance of multi-path routing for low latency video streaming, in congestion-limited ad hoc networks. In such environments, a...
Eric Setton, Xiaoqing Zhu, Bernd Girod
ICIP
2004
IEEE
16 years 2 months ago
A fluid model for error propagation characterization in video coding
An error corruption model (ECM) to describe the interframe error propagation phenomenon in a motion-compensated predictive video codec using fluid flow characteristics is proposed...
Xiaoming Sun, C. C. Jay Kuo