Triangle Surface Mesh Watermarking Based on a Constrained Optimization Framework (Englisch)
- Neue Suche nach: Rolland-Neviere, Xavier
- Neue Suche nach: Doerr, Gwenael
- Neue Suche nach: Alliez, Pierre
- Neue Suche nach: Rolland-Neviere, Xavier
- Neue Suche nach: Doerr, Gwenael
- Neue Suche nach: Alliez, Pierre
In:
IEEE Transactions on Information Forensics and Security
;
9
, 9
;
1491-1501
;
2014
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Triangle Surface Mesh Watermarking Based on a Constrained Optimization Framework
-
Beteiligte:
-
Erschienen in:IEEE Transactions on Information Forensics and Security ; 9, 9 ; 1491-1501
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.09.2014
-
Format / Umfang:1570625 byte
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis – Band 9, Ausgabe 9
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1337
-
Table of contents| 2014
- 1341
-
A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication SystemsPerez-Gonzalez, Fernando / Troncoso, Carmela / Oya, Simon et al. | 2014
- 1356
-
Transferable Multiparty Computation With Applications to the Smart GridClark, Michael R. / Hopkinson, Kenneth M. et al. | 2014
- 1367
-
A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor NetworksMoosavi, Hussein / Bui, Francis Minhthang et al. | 2014
- 1380
-
A New Watermarking Scheme Based on Antipodal Binary Dirty Paper CodingAbrardo, Andrea / Barni, Mauro et al. | 2014
- 1394
-
Probabilistic Threat Propagation for Network SecurityCarter, Kevin M. / Idika, Nwokedi / Streilein, William W. et al. | 2014
- 1406
-
(Im)possibility of Deterministic Commitment Over a Discrete Memoryless ChannelJiang, Shaoquan et al. | 2014
- 1416
-
Recognizing Gaits on Spatio-Temporal Feature DomainKusakunniran, Worapan et al. | 2014
- 1424
-
The Steganographer is the Outlier: Realistic Large-Scale SteganalysisKer, Andrew D. / Pevny, Tomas et al. | 2014
- 1436
-
Face Recognition by Super-Resolved 3D Models From Consumer Depth CamerasBerretti, Stefano / Pala, Pietro / Bimbo, Alberto del et al. | 2014
- 1450
-
Forensic Analysis of SIFT Keypoint Removal and InjectionCostanzo, Andrea / Amerini, Irene / Caldelli, Roberto / Barni, Mauro et al. | 2014
- 1465
-
Back to Static Analysis for Kernel-Level Rootkit DetectionMusavi, S.A. / Kharrazi, M. et al. | 2014
- 1477
-
On the Fingerprinting Capacity Games for Arbitrary Alphabets and Their AsymptoticsHuang, Y.-W. / Moulin, P. et al. | 2014
- 1491
-
Triangle Surface Mesh Watermarking Based on a Constrained Optimization FrameworkRolland-Neviere, Xavier / Doerr, Gwenael / Alliez, Pierre et al. | 2014
- 1502
-
Imperceptible and Robust Blind Video Watermarking Using Chrominance Embedding: A Set of Approaches in the DT CWT DomainAsikuzzaman, Md. / Alam, Md. Jahangir / Lambert, Andrew J. / Pickering, Mark Richard et al. | 2014
- 1518
-
Efficient and Accurate At-a-Distance Iris Recognition Using Geometric Key-Based Iris EncodingTan, Chun-Wei / Kumar, Ajay et al. | 2014
- 1529
-
IEEE Transactions on Information Forensics and Security Edics| 2014
- 1530
-
IEEE Transactions on Information Forensics and Security information for authors| 2014
- 1532
-
Special issue on advanced signal processing techniques for radar applications| 2014
- 1533
-
Open Access| 2014
- 1534
-
IEEE xplore digital library| 2014
- C1
-
Front Cover| 2014
- C2
-
IEEE Transactions on Information Forensics and Security publication information| 2014
- C3
-
IEEE Signal Processing Society Information| 2014