Sciweavers

287 search results - page 1 / 58
» Audio authentication based on distributed source coding
Sort
View
ICASSP
2008
IEEE
13 years 11 months ago
Audio authentication based on distributed source coding
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
David P. Varodayan, Yao-Chung Lin, Bernd Girod
ICIP
2007
IEEE
14 years 6 months ago
Image Authentication Based on Distributed Source Coding
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original imag...
Yao-Chung Lin, David P. Varodayan, Bernd Girod
ICASSP
2010
IEEE
13 years 4 months ago
Flexcode - flexible audio coding
Modern networks are highly variable and, as a result, source coders are commonly used under conditions that they were not designed for. We address this problem with a source-codin...
Janusz Klejsa, Minyue Li, W. Bastiaan Kleijn
ICPPW
2009
IEEE
13 years 11 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta
ICIP
2008
IEEE
14 years 6 months ago
Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximizatio
Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded v...
Yao-Chung Lin, David P. Varodayan, Torsten Fink, E...