Sciweavers

23 search results - page 4 / 5
» Quantization of Multiple Sources Using Integer Bit Allocatio...
Sort
View
MM
1995
ACM
100views Multimedia» more  MM 1995»
13 years 9 months ago
Fast Lossy Internet Image Transmission
Images are usually transmitted across the Internet using a lossless protocol such as TCP/IP. Lossless protocols require retransmission of lost packets, which substantially increas...
John M. Danskin, Geoffrey M. Davis, Xiyong Song
ARITH
2005
IEEE
13 years 11 months ago
The Residue Logarithmic Number System: Theory and Implementation
— The Residue Logarithmic Number System (RLNS) represents real values as quantized logarithms which, in turn, are represented using the Residue Number System (RNS). Compared to t...
Mark G. Arnold
ICIP
2008
IEEE
14 years 7 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
ICASSP
2008
IEEE
14 years 7 days ago
A two-layered trellis approach to audio encoding
The fact that audio compression for streaming or storage is usually performed offline alleviates traditional constraints on encoding delay. We propose a rate-distortion optimized...
Vinay Melkote, Kenneth Rose
ICPR
2000
IEEE
14 years 6 months ago
On Holographic Transform Compression of Images
: Lossy transform compression of images is successful and widespread. The JPEG standard uses the discrete cosine transform on blocks of the image and a bit allocation process that ...
Alfred M. Bruckstein, Robert J. Holt, Arun N. Netr...