Presence: Teleoperators and Virtual Environments
Attack on a semi-blind watermarking scheme based on singular value decomposition
Computer Standards & Interfaces
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Hyper-Interactive video browsing by a remote controller and hand gestures
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Enforcing regional DRM for multimedia broadcasts with and without trusted computing
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
A Nearly One-to-One Method to Convert Analog Signals into a Small Volume of Data: Second Part
International Journal of Strategic Information Technology and Applications
Hi-index | 0.00 |