Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded v...
Yao-Chung Lin, David P. Varodayan, Torsten Fink, E...
Interactive multiview video streaming (IMVS) is an application where, as the streaming multiview video is played back in time, an observer iteratively requests one of many availab...
Abstract— Combining multi-source cooperation and linkadaptive regenerative techniques, we develop a novel protocol capable of achieving diversity up to the number of cooperating ...
Alfonso Cano, Tairan Wang, Alejandro Ribeiro, Geor...
Practical applications that employ entropy coding for large alphabets often partition the alphabet set into two or more layers and encode each symbol by using some suitable prefix...
Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin W...
We study the problem of the reconstruction of a Gaussian field defined in [0, 1] using N sensors deployed at regular intervals. The goal is to quantify the total data rate require...
Akshay Kashyap, Cathy H. Xia, Luis Alfonso Lastras...