388 results on '"Barni, M"'
Search Results
52. A Roughness-Based Algorithm for Perceptual Watermarking of 3D Meshes
53. Digital watermarking of 3D meshes
54. Improving PLDA speaker verification with limited development data
55. Enhancing Privacy in Remote Data Classification
56. Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach
57. Multiple parenting identification in image phylogeny
58. A video forensic technique for detecting frame deletion and insertion
59. 3D Watermarking Technology: Visual Quality Aspects
60. A Robust Frame-Based Technique For Video Watermarking
61. Digital Watermarking Of Visual Data: State Of The Art And New Trends
62. Bioetica, Deontologia e Diritto per un nuovo codice professionale del medico
63. La lunga marcia della medicina alternativa verso le categorie della scienza e della responsabilità
64. Image counter-forensics based on feature injection
65. Quando mancano le parole. Strategie di compensazione lessicale in apprendenti sinofoni
66. A M.A.P. Identification Criterion for DCT Based Watermarking
67. Statistical Modelling of Full Frame DCT Coefficients
68. Riflessioni etico-deontologiche sul trapianto di rene da donatore vivente non consanguineo
69. Attacking image classification based on bag-of-visual-words
70. Localization of forgeries in MPEG-2 video through GOP size and DQ analysis
71. Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing
72. Audio informed watermarking by means of dirty trellis codes
73. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation
74. A FUZZY EXPERT SYSTEM FOR LOW LEVEL IMAGE SEGMENTATION
75. Il trapianto di fegato da donatore vivente nei suoi riflessi etico-deontologici
76. Detection of video double encoding with GOP size estimation
77. Progressive Compressed Sensing and Reconstruction of Multidimensional Signals Using Hybrid Transform/Prediction Sparsity Model
78. Emerging cryptographic challenges in image and video processing
79. On the effectiveness of local warping against SIFT-based copy-move detection
80. Dealing with uncertainty in image forensics: A fuzzy approach
81. A game theoretic approach to source identification with known statistics
82. A Dempster-Shafer framework for decision fusion in image forensics
83. Identification of cut & paste tampering by means of double-JPEG detection and image segmentation
84. Error-Resilient and Low-Complexity Onboard Lossless Compression of Hyperspectral Images by Means of Distributed Source Coding
85. Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals
86. Exploring image dependencies: a new challenge in image forensics
87. Forensics aided steganalysis of heterogeneous images
88. A compressive-sensing based watermarking scheme for sparse image tampering identification
89. MPSteg-Color: Data Hiding Through Redundant Basis Decomposition
90. On the Implementation of the Discrete Fourier Transform in the Encrypted Domain
91. Low-complexity and error-resilient hyperspectral image compression based on distributed source coding
92. Color transplant for reverse ageing of faded artworks
93. Perinatal care at an extremely low gestational age (22 25 weeks). An Italian approach: the "Carta di Firenze"
94. Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking
95. The first BOWS contest: Break Our Watermarking System
96. Detection of malevolent changes in digital video for forensic applications
97. Watermarked 3-D Mesh Quality Assessment
98. A privacy-preserving protocol for neural-network-based computation
99. Zero-knowledge ST-DM watermarking
100. Is haptic watermarking worth it?
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.