Sciweavers

25 search results - page 2 / 5
» Authentication of LZ-77 Compressed Data
Sort
View
128
Voted
PC
2007
161views Management» more  PC 2007»
15 years 19 days ago
High performance combinatorial algorithm design on the Cell Broadband Engine processor
The Sony–Toshiba–IBM Cell Broadband Engine (Cell/B.E.) is a heterogeneous multicore architecture that consists of a traditional microprocessor (PPE) with eight SIMD co-process...
David A. Bader, Virat Agarwal, Kamesh Madduri, Seu...
102
Voted
ICMCS
2009
IEEE
134views Multimedia» more  ICMCS 2009»
14 years 11 months ago
Robust lossless data hiding based on block gravity center for selective authentication
Reversible or lossless data hiding enables host media to be restored from marked media without any loss of host information. However, since most of existing lossless data hiding m...
Kyung-Su Kim, Min-Jeong Lee, Young-Ho Suh, Heung-K...
124
Voted
ICIP
2000
IEEE
16 years 2 months ago
Compression Tolerant Watermarking for Image Verification
Digital Watermarking is seen as a viable solution to authentication of multimedia data and hence its security, especially in a networked environment. In this paper we present a ne...
Harpal S. Bassali, Jatin Chhugani, Saurabh Agarwal...
114
Voted
TCSV
2008
156views more  TCSV 2008»
15 years 1 months ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
131
Voted
MM
2003
ACM
132views Multimedia» more  MM 2003»
15 years 6 months ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...