Sciweavers

4805 search results - page 81 / 961
» On the Analysis of Indexing Schemes
Sort
View
ICIP
2008
IEEE
14 years 9 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
ICIP
2005
IEEE
14 years 9 months ago
Game-theoretic analysis of a semi-fragile watermarking scheme based on SCS
Semi-fragile watermarking can be used to detect illegal and local manipulation of images, while being robust towards legal manipulations such as lossy compression. This paper desc...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
ICNSC
2007
IEEE
14 years 2 months ago
Analysis of a Simple Feedback Scheme for Error Correction over a Lossy Network
Abstract— In time varying packet-switched networks, delivering data with high reliability using a limited amount of network resources is highly desirable. To capture the trade-of...
Oscar Flardh, Carlo Fischione, Karl Henrik Johanss...
MSWIM
2005
ACM
14 years 1 months ago
Performance analysis of differentiated ARQ scheme for video transmission over wireless networks
The Advance in video coding and wireless communication techniques has enabled video-based services to be the most important component of many emerging multimedia applications. The...
Fen Hou, Pin-Han Ho, Yongbing Zhang
TCOM
2008
170views more  TCOM 2008»
13 years 8 months ago
Analysis and comparison of several simple impulsive noise mitigation schemes for OFDM receivers
A simple method of improving OFDM (orthogonal frequency division multiplexing) receiver performance in an impulsive noise environment is to precede a conventional OFDM demodulator...
S. V. Zhidkov