Periodic spline orthonormal bases
Journal of Approximation Theory
Computer Processing of Line-Drawing Images
ACM Computing Surveys (CSUR)
System development (Prentice-Hall International series in computer science)
System development (Prentice-Hall International series in computer science)
An image segmentation method for function approximation of gradation images
SPPRA'06 Proceedings of the 24th IASTED international conference on Signal processing, pattern recognition, and applications
Fluency DA functions as non-uniform sampling functions for interpolating sampled-values
ICC'08 Proceedings of the 12th WSEAS international conference on Circuits
New integrated control design method based on receding horizon control with adaptive DA converter
ACMOS'06 Proceedings of the 8th WSEAS international conference on Automatic control, modeling & simulation
Hi-index | 0.00 |
Function-approximated images are suitable for transmission over the networks, because they can be scaled on the sidelines of various resolutions of network terminals with relatively small amount of information. In this work, we use the Fluency function-approximation method that utilizes the Fluency information theory. The theory can deal with images in scalable and high-precision. Transmitted images may contain critical information that must be protected from malicious information tapping. The security, however, depends on the implementations of lower layers of the network protocol stack that are not available in many circumstances. In this paper, we propose a new image description format that applies security to function-approximation coding. It utilizes the structured properties of function-approximation format to enhance its security by hiding the coordinates of components of images. The proposed method is a secure mechanism for image coding itself; therefore, it enables secure transmission of function-approximated images without requiring any secure protocols in the lower layers. Furthermore, being independent from the lower layers, it enables flexible combinations of security mechanisms to enhance the security.