Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
A new prediction for lossless intra coding technique employs source pixel based prediction in contrast to source block based prediction is presented as an enhancement of H.264/MPE...
N. Krishnan, P. Vijayalakshmi, R. K. Selvakumar, S...
We consider the problem of reconstructing time sequences of spatially sparse signals (with unknown and time-varying sparsity patterns) from a limited number of linear "incohe...
In this paper, we first provide a joint source and channel coding (JSCC) approach in estimating Gaussian sources over Gaussian MAC channels, as well as its sufficient and necessary...
Shuangqing Wei, Rajgopal Kannan, S. Sitharama Iyen...
This paper describes a methodology for using the matrix-vector multiply and scan conversion hardware present in many graphics workstations to rapidly approximate the optical flow ...
Dan S. Wallach, Sharma Kunapalli, Michael F. Cohen