Sciweavers

113 search results - page 20 / 23
» Edge-Directed Error Concealment
Sort
View
JCS
2008
93views more  JCS 2008»
13 years 9 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
TIP
2008
95views more  TIP 2008»
13 years 9 months ago
Optimization of Packetization Masks for Image Coding Based on an Objective Cost Function for Desired Packet Spreading
In image communication over lossy packet networks (e.g., cell phone communication) packet loss errors lead to damaged images. Damaged images can be repaired with passive error conc...
Joost Rombaut, Aleksandra Pizurica, Wilfried Phili...
ICASSP
2011
IEEE
13 years 1 months ago
A distance-based slice interleaving scheme for robust video transmission over error-prone networks
Video transmission over wireless networks suffers from packet loss due to either temporary packet drop or fadinginduced bit errors. To ensure that the quality of the decoded video...
Yu Wang, Jo Yew Tham, Kwong Huang Goh, Wei Siong L...
ICC
2009
IEEE
127views Communications» more  ICC 2009»
14 years 4 months ago
Security Games with Incomplete Information
—We study two-player security games which can be viewed as sequences of nonzero-sum matrix games where at each stage of the iterations the players make imperfect observations of ...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
VTC
2007
IEEE
108views Communications» more  VTC 2007»
14 years 4 months ago
Joint Optimization of Iterative Source and Channel Decoding Using Over-Complete Source-Mapping
— The intentionally imposed or inherent unintentional residual redundancy found in source encoded bitstreams can be exploited for supporting joint SoftBit-Source Decoding and Cha...
Anh Quang Pham, Lie-Liang Yang, Lajos Hanzo