• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 1,803
Next 10 →

Perceptually lossy compression of

by unknown authors , 1997
"... facsimile, document compression, image transmission, reading performance, JPEG, CIELAB We present a method for designing JPEG quantization tables that are tailored for color facsimile transmission. The proposed technique combines results on visual acuity and peak contrast sensitivity of the human vi ..."
Abstract - Add to MetaCart
facsimile, document compression, image transmission, reading performance, JPEG, CIELAB We present a method for designing JPEG quantization tables that are tailored for color facsimile transmission. The proposed technique combines results on visual acuity and peak contrast sensitivity of the human

Lossy compression of tree architectures

by Anne-Laure Gaillard , Pascal Ferraro , Frédéric Boudon , Christophe Godin - in "6th International Workshop on Functional-Structural Plant Models
"... ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract not found

Lossy compression of . . . Viterbi Algorithm

by Shirin Jalali, Andrea Montanari, et al. , 2010
"... ..."
Abstract - Add to MetaCart
Abstract not found

Surmounting the Effects of Lossy Compression on Steganography

by Daniel L. Currie, Nab Little Creek, Cynthia E. Irvine - In National Information System Security Conference , 1996
"... Steganographic techniques can be used to hide data within digital images with little or no visible change in the perceived appearance of the image and can be exploited to export sensitive information. Since images are frequently compressed for storage or transmission, effective steganography must em ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
employ coding techniques to counter the errors caused by lossy compression algorithms. The Joint Photographic Expert Group (JPEG) compression algorithm, while producing only a small amount of visual distortion, introduces a relatively large number of errors in the bitmap data. It is shown that, despite

Lossy Compression of Dynamic, Weighted Graphs

by Wilko Henecka, Matthew Roughan
"... Abstract—A graph is used to represent data in which the relationships between the objects in the data are at least as important as the objects themselves. Large graph datasets are becoming more common as networks such as the Internet grow, and our ability to measure these graphs improves. This neces ..."
Abstract - Add to MetaCart
. This necessitates methods to compress these datasets. In this paper we present a method aimed at lossy compression of large, dynamic, weighted graphs. Keywords-graph compression; dynamic, weighted graphs; shrinkage; I.

Improvements On Data Hiding For Lossy Compression

by Husrev T. Sencar , Ali N. Akansu, Mahalingam Ramkumar , 2002
"... Compression is the most common application that all forms of multimedia data undergo. Lossy nature of the compression due to the use of quantizers should be taken into account by the watermarking technique employed. In this paper, we present a data hiding scheme that incorporates the embedding with ..."
Abstract - Add to MetaCart
Compression is the most common application that all forms of multimedia data undergo. Lossy nature of the compression due to the use of quantizers should be taken into account by the watermarking technique employed. In this paper, we present a data hiding scheme that incorporates the embedding

Surmounting the Effects of Lossy Compression on Steganography

by Irvine Cynthia E, Daniel L. Currie, Nab Little Creek, Cynthia E. Irvine , 1996
"... Steganographic techniques can be used to hide data within digital images with little or no visible change in the perceived appearance of the image and can be exploited to export sensitive information. Since images are fre-quently compressed for storage or transmission, effective steganography must e ..."
Abstract - Add to MetaCart
employ coding techniques to counter the errors caused by lossy com-pression algorithms. The Joint Photographic Expert Group (JPEG) com-pression algorithm, while producing only a small amount of visual distortion, introduces a relatively large number of errors in the bitmap data. It is shown that, despite

A Slightly Refined Lossy Compression Bound

by Matthias Seeger
"... We prove a slight refinement of a lossy compression bound (theorem 5.18 in [2]) by replacing the Hoeffding inequality in the original proof by a tighter binomial tail bound. ..."
Abstract - Add to MetaCart
We prove a slight refinement of a lossy compression bound (theorem 5.18 in [2]) by replacing the Hoeffding inequality in the original proof by a tighter binomial tail bound.

Semantic Lossy Compression of XML Data

by Mario Cannataro, Gianluca Carelli, Andrea Pugliese, Domenico Sacca - In Knowledge Representation Meets Databases
"... this paper), and compression loss can be introduced ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
this paper), and compression loss can be introduced

Interactive Lossy Compression for Images and Video

by Nathan Brewer, Lei Wang, Nianjun Liu, Li Cheng
"... Abstract—In any given scene, a human observer is typically more interested in some objects than others, and will pay more at-tention to those objects they are interested in. This paper aims to capture this attention focusing behavior by selectively merging a fine-scale oversegmentation of a frame so ..."
Abstract - Add to MetaCart
rules for images and videos based on defining a weighted distance metric between adjacent oversegments. We present as an example application of this technique a new lossy image and video stream compression method which attempts to minimize the loss in areas of interest. I.
Next 10 →
Results 11 - 20 of 1,803
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University