Sciweavers

16 search results - page 3 / 4
» Secure Lossless Compression with Side Information
Sort
View
DCC
2009
IEEE
14 years 6 months ago
Clustered Reversible-KLT for Progressive Lossy-to-Lossless 3d Image Coding
The RKLT is a lossless approximation to the KLT, and has been recently employed for progressive lossy-to-lossless coding of hyperspectral images. Both yield very good coding perfo...
Ian Blanes, Joan Serra-Sagristà
CORR
2007
Springer
133views Education» more  CORR 2007»
13 years 5 months ago
The price of ignorance: The impact of side-information on delay for lossless source-coding
Inspired by the context of compressing encrypted sources, this paper considers the general tradeoff between rate, end-to-end delay, and probability of error for lossless source co...
Cheng Chang, Anant Sahai
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
13 years 11 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
PICS
2001
13 years 7 months ago
An Autosophy Image Content-Based Television System
A first television system based on the Autosophy information theory is now being tested. The new television marks a major theoretical break from conventional television based on t...
Klaus Holtz, Eric Holtz
ASIACRYPT
2011
Springer
12 years 5 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer