Enhancing wireless video streaming using lightweight approximate authentication
暂无分享,去创建一个
[1] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[2] E. O. Elliott. Estimates of error rates for codes on burst-noise channels , 1963 .
[3] Aggelos K. Katsaggelos,et al. Review of Error Resilient Coding Techniques for Real-Time Video Communications , 2000 .
[4] Aggelos K. Katsaggelos,et al. Error resilient video coding techniques , 2000, IEEE Signal Process. Mag..
[5] S. Xiao,et al. Efficient Noise-Tolerant Message Authentication Codes Using Direct Sequence Spread Spectrum Technique , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[6] Gonzalo R. Arce,et al. Approximate image message authentication codes , 2001, IEEE Trans. Multim..
[7] E. Gilbert. Capacity of a burst-noise channel , 1960 .
[8] Sethuraman Panchanathan,et al. Error resiliency schemes in H.264/AVC standard , 2006, J. Vis. Commun. Image Represent..
[9] Giovanni Di Crescenzo,et al. Approximate Message Authentication Codes for$N$-ary Alphabets , 2006, IEEE Transactions on Information Forensics and Security.
[10] Charles G. Boncelet. The NTMAC for authentication of noisy messages , 2006, IEEE Transactions on Information Forensics and Security.
[11] Yu Liu,et al. The CRC–NTMAC for Noisy Message Authentication , 2005, IEEE Transactions on Information Forensics and Security.
[12] Andreas Willig,et al. Measurements of a wireless link in an industrial environment using an IEEE 802.11-compliant physical layer , 2002, IEEE Trans. Ind. Electron..
[13] Minghua Chen,et al. A fragile watermark error detection scheme for wireless video communications , 2005, IEEE Transactions on Multimedia.
[14] Cyril Bergeron,et al. Unequal Error Protection for H.263+ bitstreams over a wireless IP network , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[15] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[16] Y. Liu,et al. The BCH-NTMAC for Noisy Message Authentication , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[17] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .