Picture of server farm and IT infrastructure

Where technology & law meet: Open Access research on data security & its regulation ...

Strathprints makes available Open Access scholarly outputs exploring both the technical aspects of computer security, but also the regulation of existing or emerging technologies. A research specialism of the Department of Computer & Information Sciences (CIS) is computer security. Researchers explore issues surrounding web intrusion detection techniques, malware characteristics, textual steganography and trusted systems. Digital forensics and cyber crime are also a focus.

Meanwhile, the School of Law and its Centre for Internet Law & Policy undertake studies on Internet governance. An important component of this work is consideration of privacy and data protection questions and the increasing focus on cybercrime and 'cyberterrorism'.

Explore the Open Access research by CIS on computer security or the School of Law's work on law, technology and regulation. Or explore all of Strathclyde's Open Access research...

Optimized error protection of scalable image bitstreams

Hamzaoui, R. and Stankovic, Vladimir M. and Xiong, Z. (2005) Optimized error protection of scalable image bitstreams. IEEE Signal Processing Magazine, 22 (6). pp. 91-107. ISSN 1053-5888

Full text not available in this repository. Request a copy from the Strathclyde author

Abstract

This article focuses on FEC for scalable image coders. For various channel models, we survey recent progress made in system design and discuss efficient source-channel bit allocation techniques, with emphasis on unequal error protection. This article considered JSCC (joint source-channel coding) at the application layer only. Recent research has studied cross-layer optimization where JSCC is applied to both the application layer and the physical layer. The basic task here is to minimize the average distortion by allocating available power, subcarriers, and bandwidth among users at the physical layer and source-channel symbols at the application layer subject to a total resource constraint. Most of the JSCC systems covered in this article can be readily extended to transmit scalable compressed bit streams of video sequences and 3-D meshes. Due to the stringent delay constraints in video communications and the fact that MPEG is currently exploring a scalable video coding standard, fast JSCC algorithms are expected to play a bigger role and bring more performance gains. This article is also expected to stimulate further research efforts into JSCC and more importantly, prompt the industry to adopt some of these JSCC algorithms in their system designs, thus closing the cycle from algorithm development to implementation.