Learn More
Real-time transmission of video data in network environments, such as wireless and Internet, is a challenging task, as it requires high compression efficiency and network friendly design. H.264/AVC is the newest international video coding standard, jointly developed by groups from ISO/IEC and ITU-T, which aims at achieving improved compression performance(More)
Nowadays, enterprises and individuals are increasing tending to store their data in the cloud storage systems, yet, these sensitive data will face serious security threats. Currently, cloud storage service providers mainly adopt encryption and authentication to protect sensitive data, and a lot of approaches have been proposed to ensure data security in(More)
Video signals transmitted over error-prone wireless channels are often corrupted by bit errors. Due to their superior data recovery performance, the reversible variable length coding (RVLC) has been used as an error resiliency scheme in the MPEG-4 and H.263 video coding standards. In order to evaluate and compare the error resiliency performance of RVLC(More)
With the rapid development of the Internet, steganography on Voice over IP (VoIP) has been attracted a lot of research efforts. To date, existing VoIP steganography research commonly focus on information hiding in the LSB bits of Network Audio Streams, yet, we found this approach may raise serious security threat, where the hidden information may be easily(More)
In this paper, we present a low-complexity ‘reversible variable length code’ (RVLC) decoding scheme for MPEG-4 video that recovers more blocks and sometimes more macroblocks (MBs) from error propagation region of corrupted video packets, as compared to the MPEG-4 scheme. The remaining blocks and MBs are concealed. Simulation studies have been carried out to(More)
Recently, streaming steganography has attracted a lot of research efforts, however, since multimedia processing requires high performance hardware and software, most literatures in the streaming steganography community focus on simulations due to lack of a practical streaming steganography platform. Towards this issue, we design and develop VISOR, a novel(More)
Cancer cells are immature cells resulting from cellular reprogramming by gene misregulation, and redifferentiation is expected to reduce malignancy. It is unclear, however, whether cancer cells can undergo terminal differentiation. Here, we show that inhibition of the epigenetic modification enzyme enhancer of zeste homolog 2 (EZH2), histone deacetylases 1(More)
In prior work we described a 5x5 ray matrix formalism and how to integrate the effects that are not modeled in waveoptics with the ray matrix model. In this paper we describe how to complete the integration of the two techniques by modifying the Siegman ABCD ray matrix decomposition. After removing the separable effects like image rotation and image(More)
This paper preliminarily discusses how to develop software towards exascale computing. Two typical development models are studied, one is “all-round contract” which means all the functional modules are implemented in a single framework, and the other is “co-design” which using the existing packages to realize functional modules.(More)