Sciweavers

59 search results - page 11 / 12
» On the Decoding Process in Ternary Error-Correcting Output C...
Sort
View
DICTA
2007
13 years 6 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
DCC
2002
IEEE
14 years 4 months ago
Source Requantization: Successive Degradation and Bit Stealing
We consider source requantization in two forms -- successive degradation (i.e., source fidelity reduction) and bit stealing (i.e., information embedding) -when no forward planning...
Aaron S. Cohen, Stark C. Draper, Emin Martinian, G...
PICS
2003
13 years 6 months ago
Robust Processing of Color Target Measurements for Device Characterization
Device  characterization  typically  involves  generating one  or  more  targets  each  comprising  a  number  of  color patches  and  making  colorimetric  measu...
Raja Bala, Gaurav Sharma, Dennis Venable
ICIP
2005
IEEE
14 years 6 months ago
A BPGC-based scalable image entropy coder resilient to errors
In this paper, we present a new entropy coder, Contextbased Bit Plane Golomb Coder (CB-BPGC) for scalable image coding, which achieves better coding performance with lower complex...
Rong Zhang, Qibin Sun, Wai-Choong Wong
CISS
2008
IEEE
13 years 11 months ago
Near optimal lossy source coding and compression-based denoising via Markov chain Monte Carlo
— We propose an implementable new universal lossy source coding algorithm. The new algorithm utilizes two wellknown tools from statistical physics and computer science: Gibbs sam...
Shirin Jalali, Tsachy Weissman