Sciweavers

317 search results - page 16 / 64
» Practical Key Distribution Schemes for Channel Protection
Sort
View
95
Voted
ICIP
2004
IEEE
15 years 11 months ago
Systematic lossy forward error protection for error-resilient digital video broadcasting -a wyner-ziv coding approach
We present a practical scheme for error-resilient digital video broadcasting, using the Wyner-Ziv coding paradigm. We apply the general framework of systematic lossy source-channe...
Shantanu Rane, Anne Aaron, Bernd Girod
99
Voted
TCSV
2010
14 years 4 months ago
Perceptually Unequal Packet Loss Protection by Weighting Saliency and Error Propagation
We describe a method for achieving perceptually minimal video distortion over packet-erasure networks using perceptually unequal loss protection (PULP). There are two main ingredie...
Hojin Ha, Jincheol Park, Sanghoon Lee, Alan Conrad...
MM
2004
ACM
107views Multimedia» more  MM 2004»
15 years 3 months ago
Collusion attack on a multi-key secure video proxy scheme
In ACM Multimedia’2002, a video proxy scheme was proposed for secure video delivery. In the scheme, a video is cached in proxies in encrypted form so that it remains nondisclose...
Yongdong Wu, Feng Bao
ICIAR
2005
Springer
15 years 3 months ago
Unequal Error Protection Using Convolutional Codes for PCA-Coded Images
Image communication is a significant research area which involves improvement in image coding and communication techniques. In this paper, Principal Component Analysis (PCA) is use...
Sabina Hosic, Aykut Hocanin, Hasan Demirel
SPW
1997
Springer
15 years 1 months ago
Protocols Using Anonymous Connections: Mobile Applications
This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols ryption as primitive. This abstraction allows us t...
Michael G. Reed, Paul F. Syverson, David M. Goldsc...