Sciweavers

490 search results - page 8 / 98
» Image Authentication Based on Distributed Source Coding
Sort
View
DCC
2008
IEEE
14 years 6 months ago
Dimension Reduction and Expansion: Distributed Source Coding in a Noisy Environment
We studied the problem of distributed coding and transmission of intercorrelated sources with memory. Different from the conventional distributed source coding structure which rel...
Anna N. Kim, Fredrik Hekland
DCC
2004
IEEE
14 years 6 months ago
Slepian-Wolf Coding for Nonuniform Sources Using Turbo Codes
The recently proposed turbo-binning scheme is shown to be both efficient and optimal for uniform source Slepian-Wolf coding problem [1]. This paper studies the case when sources a...
Jing (Tiffany) Li, Zhenyu Tu, Rick S. Blum
GLOBECOM
2009
IEEE
13 years 11 months ago
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes
File distribution is becoming a key technology, in particular in large scale content broadcasting systems like DVBH/SH. They largely rely on Application Level FEC codes (ALFEC) in ...
Mathieu Cunche, Vincent Roca
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 21 days ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
ICIP
2006
IEEE
14 years 8 months ago
Rate-Distortion Optimized Streaming of Authenticated Video
Stream authentication methods usually impose overhead and dependency among packets. The straightforward application of state-of-the-art rate-distortion (R-D) optimized streaming t...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G....