Sciweavers

490 search results - page 3 / 98
» Image Authentication Based on Distributed Source Coding
Sort
View
ICIP
2005
IEEE
15 years 11 months ago
Combining MCTF with distributed source coding
Motion Compensated Temporal Filtering (MCTF) has proved to be an efficient coding tool in the design of open-loop scalable video codecs. In this paper we propose a MCTF video codi...
Marco Tagliasacchi, Stefano Tubaro, Augusto Sarti
ICPADS
2005
IEEE
15 years 3 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
ICIP
2007
IEEE
15 years 11 months ago
Overlapped Quasi-Arithmetic Codes for Distributed Video Coding
This paper describes Slepian-Wolf codes based on overlapped quasi-arithmetic codes, where overlapping allows lossy compression of the source below its entropy. In the context of s...
Xavier Artigas, Simon Malinowski, Christine Guille...
DSOM
2003
Springer
15 years 2 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
IJNSEC
2007
122views more  IJNSEC 2007»
14 years 9 months ago
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot pr...
Rongxing Lu, Zhenfu Cao