Sciweavers

362 search results - page 23 / 73
» On Bounded-Weight Error-Correcting Codes
Sort
View
IWDW
2005
Springer
15 years 2 months ago
Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information
In a fingerprinting scheme a distributor places marks in each copy of a digital object. Placing different marks in different copies, uniquely identifies the recipient of each cop...
Miguel Soriano, Marcel Fernandez, Josep Cotrina Na...
ICASSP
2011
IEEE
14 years 1 months ago
Performance evaluation of Raptor and Random Linear Codes for H.264/AVC video transmission over DVB-H networks
Application Layer Forward Error Correction (AL)-FEC is increasingly being employed in the emerging wireless multimedia applications, where the multimedia data is sent along with r...
Sajid Nazir, Dejan Vukobratovic, Vladimir Stankovi...
ICASSP
2011
IEEE
14 years 1 months ago
Joint source-channel rate control for pixel-domain distributed video coding
We study the scenario of pixel-domain distributed video coding for noisy transmission environments and propose a method to allocate the available rate between source coding and ch...
Hu Chen, Eckehard G. Steinbach, Chang Wen Chen
CISS
2011
IEEE
14 years 1 months ago
Secret key generation through OFDM multipath channel
—We analyze the fundamental limits of key generation and describe an implementation based on error correcting codes. We show that key extraction based on channel coefficients si...
Yanpei Liu, Stark C. Draper, Akbar M. Sayeed
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
13 years 9 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...