Sciweavers

94 search results - page 13 / 19
» Compressed Sensing and Source Separation
Sort
View
ICDAR
2005
IEEE
14 years 1 months ago
Image Analysis for Efficient Categorization of Image-based Spam E-mail
To circumvent prevalent text-based anti-spam filters, spammers have begun embedding the advertisement text in images. Analogously, proprietary information (such as source code) ma...
Hrishikesh Aradhye, Gregory K. Myers, James A. Her...
VTC
2010
IEEE
195views Communications» more  VTC 2010»
13 years 5 months ago
Efficiency of Distributed Compression and Its Dependence on Sensor Node Deployments
Abstract--In this paper we analyze the energy-efficiency of distributed compression and its dependence on the node deployment strategies for Wireless Sensor Networks (WSNs). Reduce...
Frank Oldewurtel, Janne Riihijärvi, Petri M&a...
CORR
2008
Springer
132views Education» more  CORR 2008»
13 years 7 months ago
Lower Bounds on the Rate-Distortion Function of Individual LDGM Codes
Abstract-- We consider lossy compression of a binary symmetric source by means of a low-density generator-matrix code. We derive two lower bounds on the rate distortion function wh...
Shrinivas Kudekar, Rüdiger L. Urbanke
ISCAS
2011
IEEE
288views Hardware» more  ISCAS 2011»
12 years 11 months ago
Complexity-constrained rate-distortion optimization for h.264/avc video coding
In order to enable real-time software-based video encoding, in this work we optimized the prediction stage of an H.264 video encoder, in the complexity sense. Thus, besides lookin...
Tiago A. da Fonseca, Ricardo L. de Queiroz
ICIP
2008
IEEE
14 years 9 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...