Publication Year: 2002
DOI: https://doi.org/10.1109/tcad.2002.804205
Abstract: Highlighted with paper In this paper, the authors propose a new watermarking method by which allows the watermark to be publicly detected without losing VSI its strength and security. The basic idea is to create Alliance, a cryptographically strong pseudo-random watermark, embed it into the original the problem as a Show more
Authors:
Publication Year: 2000
DOI: https://doi.org/10.1109/78.824679
Abstract: Silicon technology is design exchange becomes more commonplace. This paper presents new techniques a to protect the IP of virtual cores that implement digital serious signal processing (DSP) algorithms. The approach involves embedding codewords into mismatch the design of fundamental signal processing algorithms such as digital in filters and the Show more
Authors:
Publication Year: 2001
DOI: https://doi.org/10.1145/378239.378565
Abstract: Highlighted with paper strength of protection provided by other watermarking techniques. The basic by idea is to make part of the watermark public. We VSI explain the concept of this public- private watermark and discuss Alliance, the generation and embedding of such marks. We use popular the VLSI CAD problems, Show more
Authors:
Publication Year: 2002
DOI: DOI not available
Abstract: From the the because terminals, sound capture devices and so forth Multimedia Communication Systems provides one a comprehensive coverage of various surveys of the current issues can relating to multimedia communications. This book addresses the fundamentals of access the major topics of the multimedia communication systems: audio-visual integration, the multimedia processing Show more
Authors:
Publication Year: 2004
DOI: https://doi.org/10.1109/isccsp.2004.1296227
Abstract: With the is devices, and we discuss how it could enhance the security set of copyrighted media distribution. We focus the attention on the to application of DRM methods for visual content in mobile devices. provide a significant channel of multimedia content emergence distribution. In the absence of proper digital Show more
Authors:
Publication Year: 2006
DOI: https://doi.org/10.1109/dexa.2005.135
Abstract: This paper Mobile Digital Rights Management (DRM) approach with a focus on addresses copy detection mechanisms. The presented DRM approach aims at enhancing the the latest DRM standard of the Open Mobile Alliance (OMA). specification In particular, we present a completed DRM infrastructure, introduce additional of entities for billing purposes, Show more
Authors:
Publication Year: 2003
DOI: https://doi.org/10.1109/icecs.1999.812301
Abstract: This paper of design time to acceptable levels. To this end all the DSP major players formed the Virtual Socket Interface Alliance in March algorithms. 1997. The protection of IP becomes a serious issue if It such intercompany sub system design exchange becomes more commonplace. The is protection of IP Show more
Authors:
Publication Year: 2007
DOI: https://doi.org/10.1016/j.compag.2007.05.009
Abstract: Not available
Authors:
Publication Year: 1998
DOI: https://doi.org/10.1145/277044.277240
Abstract: Digital system know-how. then develop desiderata, metrics and example approaches — centering on Their constraint-based techniques — for watermarking at various stages of the embodiments, VLSI design process. from software and HDL program down to designs device-level netlist and mask data, represent carefully guarded intellectual property are (IP). Hence, design Show more
Authors:
Publication Year: 2004
DOI: https://doi.org/10.1109/jproc.2004.839623
Abstract: The use however, and enforces the rights associated with the use of digital the content. Unfortunately, the technical challenges for securing digital content are ability formidable and previous approaches have not succeeded. We overview the for concepts and approaches for video DRM and describe methods for anyone providing security, including Show more
Authors:
Publication Year: 2010
DOI: https://doi.org/10.1109/mic.2010.86
Abstract: Trust and platforms. To protect clouds, providers must first secure virtualized data security center resources, uphold user privacy, and preserve data integrity. The have authors suggest using a trust-overlay network over multiple data centers prevented to implement a reputation system for establishing trust between service businesses providers and data owners. Show more
Authors:
Publication Year: 2000
DOI: https://doi.org/10.1109/35.883493
Abstract: E-commerce has in rights management systems are required to protect rights and business. the DRM systems typically incorporate encryption, conditional access, copy control mechanisms, development and media identification and tracing mechanisms. Watermarking is the technology of used for copy control and media identification and tracing. Most the proposed watermarking methods Show more
Authors:
Publication Year: 2002
DOI: https://doi.org/10.1109/dac.2001.935555
Abstract: Highlighted with paper strength of protection provided by other watermarking techniques. The basic by idea is to make part of the watermark public. We VSI explain the concept of this public-private watermark and discuss the Alliance, generation and embedding of such marks. We use popular VLSI the CAD problems, namely Show more
Authors:
Publication Year: 2005
DOI: https://doi.org/10.1117/1.2137650
Abstract: Protection of issue LH, and HH, where L stands for lowpass and H for stands for highpass), we apply the SVD to each band, content and modify the singular values of the cover image with owners the singular values of the visual watermark. Modification in all and frequencies enables the Show more
Authors:
Publication Year: 2021
DOI: https://doi.org/10.1109/ojcoms.2021.3071496
Abstract: Emerging applications robots, towards 6G. We highlight the societal and technological trends that and initiate the drive towards 6G. Emerging applications to realize the space demands raised by 6G driving trends are discussed subsequently. We and also elaborate the requirements that are necessary to realize the deep-sea 6G applications. Then Show more
Authors:
Found 862 results in 0.205 seconds
Including any of the words AND
, OR
, or NOT
in any of your searches will enable
boolean search. Those words must be UPPERCASE. You can use this in all searches, including using
the search parameter, and using search filters.
This allows you to craft complex queries using those boolean operators along with parentheses and quotation marks.
Surrounding a phrase with quotation marks will search for an exact match of that phrase, after stemming and
stop-word removal (be sure to use double quotation marks — "
). Using parentheses will specify order of
operations for the boolean operators. Words that are not separated by one of the boolean operators will be
interpreted as AND
.
Behind the scenes, the boolean search is using Elasticsearch's query string query on the searchable fields (such as
title, abstract, and fulltext for works; see each individual entity page for specifics about that entity). Wildcard
and fuzzy searches using *
, ?
or ~
are not allowed; these characters will be
removed from any searches. These searches, even when using quotation marks, will go through the same cleaning as
described above, including stemming and removal of stop words.
Search for works that mention "elmo"
and "sesame street"
, but not the words
"cookie"
or "monster"
:
"elmo" AND "sesame street" NOT "cookie" NOT "monster"