Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
We consider the problem of hiding images in images. In addition to the usual design constraints such as imperceptible host degradation and robustness in presence of variety of att...
Kaushal Solanki, Onkar Dabeer, B. S. Manjunath, Up...
We consider applications using depth-based Imagebased rendering (IBR), where the synthesis of arbitrary views occur at a remote location, necessitating the compression and transmi...
Ravi Krishnamurthy, Bing-Bing Chai, Hai Tao, Srira...
Compound (or mixed) document images contain graphic or textual content along with pictures. They are a very common form of documents, found in magazines, brochures, web-sites etc....
This paper proposes a data pruning-based compression scheme to improve the rate-distortion relation of compressed images and video sequences. The original frames are pruned to a s...