Learn More
Recently, several watermarking schemes have been proposed that embed a watermark into two halftone images such that the watermark can be extracted by overlaying these halftone images. The watermark images in these schemes are binary images and the pixels in the two halftone images are correlated or not depending on whether the corresponding pixel in the(More)
Recently, methods in stochastic control are used to study the synchronization properties of a nonautonomous discrete-time linear system ( + 1) = ( ) ( ) where the matrices ( ) are derived from a random graph process. The purpose of this note is to extend this analysis to directed graphs and more general random graph processes. Rather than using Lyapunov(More)
In this case permission to photocopy is not required from the publisher. All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the Publisher.(More)
As an efficient distribution mechanism, peer-to-peer technology has become a tremendously attractive solution to offload servers in large scale video streaming applications. However, in providing on-demand asynchronous streaming services, P2P streaming design faces two major challenges: how to schedule efficient video sharing between peers with asynchronous(More)
As an efficient distribution mechanism, Peer-to-Peer (P2P) technology has become a tremendously attractive solution to offload servers in large-scale video streaming applications. However, in providing on-demand asynchronous streaming services, P2P streaming design faces two major challenges: how to schedule efficient video sharing between peers with(More)
We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is demonstrated. The image authentication scheme is based on the data hiding scheme and can detect, localize,(More)
Introduction The problem of halftoning in digital printing has provided a splendid new example of a mathematical opportunity in modern technology. Digital halftoning is the technique used to display an image with a few immiscible colors discretely applied to paper. This problem involves various fields of science such as the physics of light, the biology of(More)