The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computing on time-based data is a recent evolution of research in stochastic computing. As with stochastic computing, complex functions can be computed with remarkably low area cost. Unlike stochastic computing, the latency and energy efficiency are very favorable compared to computations on conventional binary radix. In this article, the authors review and evaluate the design and implementation of...
Wireless sensor networks pose strict bandwidth and power constraints. In multimedia Sensor Networks classical rate distortion function may not be directly applied since timely delivery of multimedia content in sensor network may necessitate consideration of energy consumption and transmission rate in the process. Both these factors should be incorporated in classical R-D function to achieve best operational...
In this paper, we propose an adaptive modulation scheme for image transmission over fading channels. The proposed scheme partitions the received signal-to-noise (SNR) space as well as the transmitted information based on its importance. Then, it jointly considers the channel condition and the importance of the transmitted bitstream when deciding on the modulation level. More specifically, the scheme...
In this paper, a self-recovery image authentication technique is proposed using randomly-sized blocks. To dived an image into randomly-sized blocks, it undergoes recursive arbitrarily-asymmetric quad tree partitioning. Multiple description coding (MDC) that enhances reliability of altered block recovery, is utilized to generate two block descriptions. We propose the use of a chain with multiple links...
In this paper, a secure variable-size block-based image authentication technique is proposed that can not only localize the alteration detection but also recover the missing data. An image undergoes recursive arbitrarily-asymmetric binary tree partitioning to obtain randomly-sized blocks spanning the entire image. To enhance reliability of altered block recovery, multiple description coding (MDC)...
Efficient image transmission over wireless networks is challenged with the limited bandwidth and time-varying nature of the underlying channels. In this paper, we propose a joint variable modulation and power allocation scheme for transmission of compressed images. In our scheme, the modulation level and allocated power are jointly optimized to minimize the mean square error (MSE) of the reconstructed...
This paper presents three simple methods alternatives to visual cryptography for colored images. In the first method, an RGB colored image is converted to HSI image generating 8 sub-images. Then each sub-image is divided to an arbitrary number of slides (8 slides) sub-images and encrypted using XOR operation with HSI random keys. A substitution process is applied for decryption followed by HIS/RGB...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.