4 research outputs found

    Policy-aware algorithms for proxy placement in the Internet

    No full text
    157-17

    Multimedia authentication and watermarking

    No full text
    Most multimedia signals today are in digital formats which are easy to reproduce and modify without any trace of manipulations. In this chapter, we present a comprehensive review of current technologies for multimedia data authentication and tamper detection. We first introduce in Section 7.2 the problem issues and general requirements for a multimedia authentication system. This is followed in Section 7.3 with detailed descriptions of the current algorithms for the three types of multimedia authentication: hard or complete authentication, soft authentication, and content-based authentication. The conclusion and future research directions are presented in Section 7.4

    Management of Moderate Hypertriglyceridemia in Childhood and Adolescence

    No full text
    corecore