Sciweavers

381 search results - page 68 / 77
» Error-Correcting Codes in Steganography
Sort
View
MM
1995
ACM
100views Multimedia» more  MM 1995»
15 years 3 months ago
Fast Lossy Internet Image Transmission
Images are usually transmitted across the Internet using a lossless protocol such as TCP/IP. Lossless protocols require retransmission of lost packets, which substantially increas...
John M. Danskin, Geoffrey M. Davis, Xiyong Song
DICTA
2007
15 years 1 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
CSREAESA
2009
15 years 23 days ago
Built-In Self-Test of Embedded SEU Detection Cores in Virtex-4 and Virtex-5 FPGAs
A Built-In Self-Test (BIST) approach is presented for the Internal Configuration Access Port (ICAP) and Frame Error Correcting Code (ECC) logic cores embedded in Xilinx Virtex-4 an...
Bradley F. Dutton, Charles E. Stroud
CG
2007
Springer
14 years 11 months ago
Subdivision surface watermarking
This paper presents a robust non-blind watermarking scheme for subdivision surfaces. The algorithm works in the frequency domain, by modulating spectral coefficients of the subdi...
Guillaume Lavoué, Florence Denis, Florent D...
COMCOM
2007
174views more  COMCOM 2007»
14 years 11 months ago
Directional geographical routing for real-time video communications in wireless sensor networks
In this paper, we address the problem of real-time video streaming over a bandwidth and energy constrained wireless sensor network (WSN) from a small number of dispersed video-sen...
Min Chen, Victor C. M. Leung, Shiwen Mao, Yong Yua...