Learn More
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data is embedded as fragile, blind and erasable watermark with low video quality degradations. Because of using a fragile watermark, hard authentication is possible. In contrast to other approaches, the watermarking is done after the(More)
Experiments were performed in bovine chromaffin cells in short term primary culture. Tetrandrine is a plant alkaloid from the chinese medical herb Stefania tetrandra. The aim of the present study was to investigate the mechanisms by which tetrandrine interacts with calcium signalling and to provide a quantitative description of effects. Tetrandrine blocked(More)
This work presents a new VLSI model for biological neural systems, a unified research tool for neuro- as well as computer science. It allows construction of neural microcircuits close to the biological specimen while maintaining a speed several orders faster than real time. The synapse model includes an implementation of spike time dependent plasticity(More)
Current investigations in the area of 3D video systems are based on depth map sequences. They are used to determine the compatibility with conventional 2D video systems. Instead of transmitting or storing two 2D video sequences for each eye, 2D video and the appropriate depth information is delivered. If the viewer owns a standard TV set, only the video is(More)
In this paper, we present a new video watermarking approach which is robust to efficient video coding standards such as H.264/AVC. We show the contradiction between embedding watermarks in the irrelevant part of a video and using a lossy compression algorithm to reduce the video data rate. Because the compression algorithm removes irrelevant information,(More)
Distributed Video Coding (DVC) is a recent paradigm that offers emerging capabilities in contradiction to the established conventional video coding techniques. Based on the Slepian-Wolf (SW) and Wyner-Ziv (WZ) theorems, a DVC system has an outstanding low encoding complexity, by shifting the computational complex process of correlation exploration to the(More)
Authentication watermarking approaches can be classified into two kinds: fragile and semi-fragile. In contrast to the latter one, fragile watermarking does not tolerate modifications of any single bit of the watermarked data. Since the transmission of digital data often requires lossy compression, an authentication system should accept non-malicious(More)