Learn More
A key ingredient to copyright protection , digital watermarking provides a solution to the illegal copying of material. It also has broader uses in recording and electronic transaction tracking. This book explains " the principles underlying digital water-marking technologies, describes the requirements that have given rise to them, and discusses the(More)
A key ingredient to copyright protection , digital watermarking provides a solution to the illegal copying of material. It also has broader uses in recording and electronic transaction tracking. This book explains " the principles underlying digital water-marking technologies, describes the requirements that have given rise to them, and discusses the(More)
Many electronic watermarks for still images and video content are sensitive to geometric distortions. For example, simple rotation, scaling, and/or translation (RST) of an image can prevent blind detection of a public watermark. In this paper, we propose a watermarking algorithm that is robust to RST distortions. The watermark is embedded into a(More)
We describe a new watermarking system based on the principles of informed coding and informed embedding. This system is capable of embedding 1380 bits of information in images with dimensions 240/spl times/368 pixels. Experiments on 2000 images indicate the watermarks are robust to significant valumetric distortions, including additive noise, low-pass(More)
We describe a novel method for real-time, simultaneous multi-view face detection and facial pose estimation. The method employs a convolu-tional network to map face images to points on a manifold, parametrized by pose, and non-face images to points far from that manifold. This network is trained by optimizing a loss function of three variables: image ,(More)
This paper 1 describes PicHunter, an image retrieval system that implements a novel approach to relevance feedback, such that the entire history of user selections contributes to the system's estimate of the user's goal image. To accomplish this, PicHunter uses Bayesian learning based on a probabilistic model of a user's behavior. The predictions of this(More)
Electronic watermarking can be traced back as far as 1954. The last 10 years has seen considerable interest in digital watermarking, due, in large part, to concerns about illegal piracy of copyrighted content. In this paper, we consider the following questions: is the interest warranted? What are the commercial applications of the technology? What(More)
The function of Type 1, classic cadherins depends on their association with the actin cytoskeleton, a connection mediated by alpha- and beta-catenin. The phosphorylation state of beta-catenin is crucial for its association with cadherin and thus the association of cadherin with the cytoskeleton. We now show that the phosphorylation of beta-catenin is(More)
Evolutionary computation uses mechanisms derived from natural evolution to solve problems or generate designs. This book concentrates on evolutionary computation in creative areas such as art, music, and design. It shows how human interaction, new representations , and open-ended evolution can extend the capabilities of evolutionary computation. An(More)
Evolutionary computation uses mechanisms derived from natural evolution to solve problems or generate designs. This book concentrates on evolutionary computation in creative areas such as art, music, and design. It shows how human interaction, new representations , and open-ended evolution can extend the capabilities of evolutionary computation. An(More)