For watermarking music scores different information carriers have been proposed. Dependent on the used information carrier the proposed methods have different strengths. The methods proposed so far have advantages eit...
详细信息
For watermarking music scores different information carriers have been proposed. Dependent on the used information carrier the proposed methods have different strengths. The methods proposed so far have advantages either in robustness or in capacity. Thus, the potential user of watermarking techniques has to decide which watermarking scheme fits his needs best. Although changing the features of the musical symbols for embedding a watermark is highly robust, the capacity is limited by the number of musical symbols which are present in the music score which should be watermarked. The method we propose uses the staff lines for embedding information. Its advantage is its independence of the number of musical symbols. Even an empty music score can be watermarked. To increase robustness in comparison to other existing approaches we do not change the thickness of the staff lines. The staff line properties straightness and vertical distances are used for embedding information. Because we are using scanned images as source files, two major parts in the implementation can be identified: staff line detection and geometrical transformation of the image which are described in this article.
In this paper we propose a concept to transfer a non real-time watermarking system into a watermarking system, which meets the requirements of a media-on-demand system. Several application scenarios requiring the embe...
详细信息
In this paper we propose a concept to transfer a non real-time watermarking system into a watermarking system, which meets the requirements of a media-on-demand system. Several application scenarios requiring the embedding of watermarks with maximum speed are presented. The basic concept with assumptions concerning the underlying watermarking algorithms are discussed. The paper presents the necessary media preparation and the corresponding algorithm realizing the model. Enhancements of the fundamental principle concerning the distribution of MP3 files are demonstrated.
This paper presents methods for the quality evaluation of watermarked audio data. Subjective and objective methods used in testing transparency as well as approaches rating the quality of the watermarked copies with r...
详细信息
This paper presents methods for the quality evaluation of watermarked audio data. Subjective and objective methods used in testing transparency as well as approaches rating the quality of the watermarked copies with regard to the original ones are presented. The various methods are discussed and detailed with regard to their applicability. According to the discussions two different kinds of tests were performed to test the quality of items watermarked with the algorithm presented in Arnold (2000). During the tests different settings of the so-called noise-to-mask ratio (NMR) were used. The first test is a subjective listener test which compares the quality of the original audio track with the watermarked one. The second test uses objective methods to rate the quality of watermarked audio tracks as well as compressed original audio tracks with the so-called objective difference grade (ODG). The results are compared to rate the quality of the watermarked items with respect to the compressed ones.
Fingerprint matching is a common technique for biometric authentication. Solid state sensors allow that fingerprint recognition is used in small sized embedded systems. The size of these sensors makes it necessary to ...
详细信息
Mobile agent security is still a young discipline and most naturally, the focus up to the time of writing was on inventing new cryptographic protocols for securing various aspects of mobile agents. However, past exper...
详细信息
Mobile agent security is still a young discipline and most naturally, the focus up to the time of writing was on inventing new cryptographic protocols for securing various aspects of mobile agents. However, past experience shows that protocols can be flawed, and flaws in protocols can remain unnoticed for a long period of time. The game of breaking and fixing protocols is a necessary evolutionary process that leads to a better understanding of the underlying problems and ultimately to more robust and secure systems. Although, to the best of our knowledge, little work has been published on breaking protocols for mobile agents, it is inconceivable that the multitude of protocols proposed so far are all flawless. As it turns out, the opposite is true. We identify flaws in protocols proposed by Corradi et al ., Karjoth et al ., and Karnik et al ., including protocols based on secure coprocessors. Additionally, we propose how the protocols can be strengthened against the types of attacks we launch against them.
Theußl et al. [Theußl et al. 2001] showed that volumetric data sampled on a body-centred cubic (BCC) lattice is nearly 30% more efficient than data sampled on a cubic lattice, and produced volume renderings ...
详细信息
ISBN:
(纸本)1581135254
Theußl et al. [Theußl et al. 2001] showed that volumetric data sampled on a body-centred cubic (BCC) lattice is nearly 30% more efficient than data sampled on a cubic lattice, and produced volume renderings using splatting. We extend this work to generate isosurfaces based on the BCC lattice, and also on the hexagonal-close packed (HCP) grid. This sketch presents a modified version of marching octahedra that simplifies the BCC mesh to an octahedral mesh to reduce the number of triangles generated for the isosurface.
Addresses the problem of fast object recognition and pose determination of segmented objects. It combines the well-studied parametric eigenspace method with statistical moments of image signatures resulting in a compu...
详细信息
Addresses the problem of fast object recognition and pose determination of segmented objects. It combines the well-studied parametric eigenspace method with statistical moments of image signatures resulting in a computationally and memory efficient algorithm. The approach is suited for time or memory critical applications, e.g. in embedded systems. A variety of experiments on a set of 1620 images compare the recognition and pose estimation performance to the standard eigenspace technique. The results show that despite the reduced memory and speed requirements the recognition rate is identical to the standard method; only under heavy noise conditions is the pose estimation accuracy slightly lower.
Head detection is an important, but difficult task, if no restrictions such as static illumination, frontal face appearance or uniform background can be assumed. We present a system that is able to perform head detect...
详细信息
The MPEG-4 standard specifies a set of low-level animation parameters for body animation, but does not provide any high-level functionality for the control of avatars or embodied agents. In this paper we discuss the r...
详细信息
The MPEG-4 standard specifies a set of low-level animation parameters for body animation, but does not provide any high-level functionality for the control of avatars or embodied agents. In this paper we discuss the required features for a script format allowing designers to easily specify complex bodily behaviors, and describe a system and its associated syntax - Body Animation Script (BAS) - which fulfills these requirements in a flexible way. The described architecture allows the organization and parametrization of predefined MPEG-4 animations and their integration with real-time algorithmic animations, such as pointing at a specific location or walking. This system has been implemented at EPFL in the framework of the EU SoNG project, in order to allow intelligent software agents to control their 3D graphical representation and end-users to trigger rich nonverbal behaviors from an online interface. It has been integrated into AML - the Avatar Markup Language.
This paper describes an ant colony system (ACS) for labeling point features. A pre-processing step reduces the search space in a safe way. The ACS applies local improvement and masking, a technique that focuses the op...
详细信息
This paper describes an ant colony system (ACS) for labeling point features. A pre-processing step reduces the search space in a safe way. The ACS applies local improvement and masking, a technique that focuses the optimization on critical regions. Empirical results indicate that the ACS reliably identifies high-quality solutions which are in many cases better than those of a state-of-the-art genetic algorithm for point-feature labeling.
暂无评论