Sciweavers

381 search results - page 21 / 77
» Error-Correcting Codes in Steganography
Sort
View
ISCAS
2003
IEEE
113views Hardware» more  ISCAS 2003»
15 years 5 months ago
Analog-decoder experiments with subthreshold CMOS soft-gates
A collection of analog “soft-gate” CMOS ASICs operating in subthreshold-mode was implemented in a low-cost semi-custom 0.8 µm technology. These soft-gates allow, in particula...
Matthias Frey, Hans-Andrea Loeliger, Felix Lustenb...
ICMCS
2007
IEEE
125views Multimedia» more  ICMCS 2007»
15 years 6 months ago
JPEG Based Conditional Entropy Coding for Correlated Steganography
Correlated steganography considers the case in which the cover Work is chosen to be correlated with the covert message that is to be hidden. The advantage of this is that, at leas...
Lei Zheng, Ingemar J. Cox
DFT
2007
IEEE
103views VLSI» more  DFT 2007»
15 years 6 months ago
Reliable Network-on-Chip Using a Low Cost Unequal Error Protection Code
The network-on-chip (NoC) paradigm is seen as a way of facilitating the integration of a large number of computational and storage blocks on a chip to meet several performance and...
Avijit Dutta, Nur A. Touba
SECRYPT
2008
125views Business» more  SECRYPT 2008»
15 years 1 months ago
CSteg: Talking in C Code - Steganography of C Source Code in Text
Jorge Blasco Alís, Julio César Hern&...
VTC
2006
IEEE
101views Communications» more  VTC 2006»
15 years 5 months ago
Application Layer FEC for Improved Mobile Reception of DVB-H Streaming Services
— This paper evaluates the capability of Application Layer - Forward Error Correction (AL-FEC) with Raptor coding for improving the reception of DVB-H streaming services for mobi...
David Gomez-Barquero, Aurelian Bria