Skip to main content

Showing 1–36 of 36 results for author: Saxena, V

  1. arXiv:2402.15059  [pdf, other

    cs.CL cs.IR

    ColBERT-XM: A Modular Multi-Vector Representation Model for Zero-Shot Multilingual Information Retrieval

    Authors: Antoine Louis, Vageesh Saxena, Gijs van Dijck, Gerasimos Spanakis

    Abstract: State-of-the-art neural retrievers predominantly focus on high-resource languages like English, which impedes their adoption in retrieval scenarios involving other languages. Current approaches circumvent the lack of high-quality labeled data in non-English languages by leveraging multilingual pretrained language models capable of cross-lingual transfer. However, these models require substantial t… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

    Comments: Under review. Code is available at https://github.com/ant-louis/xm-retrievers

  2. arXiv:2401.08987  [pdf, other

    quant-ph cs.CR

    The Quantum Cryptography Approach: Unleashing the Potential of Quantum Key Reconciliation Protocol for Secure Communication

    Authors: Neha Sharma, Vikas Saxena

    Abstract: Quantum cryptography is the study of delivering secret communications across a quantum channel. Recently, Quantum Key Distribution (QKD) has been recognized as the most important breakthrough in quantum cryptography. This process facilitates two distant parties to share secure communications based on physical laws. The BB84 protocol was developed in 1984 and remains the most widely used among BB92… ▽ More

    Submitted 17 January, 2024; originally announced January 2024.

  3. arXiv:2311.01419  [pdf, other

    cs.RO

    Constrained-Context Conditional Diffusion Models for Imitation Learning

    Authors: Vaibhav Saxena, Yotto Koga, Danfei Xu

    Abstract: Offline Imitation Learning (IL) is a powerful paradigm to learn visuomotor skills, especially for high-precision manipulation tasks. However, IL methods are prone to spurious correlation - expressive models may focus on distractors that are irrelevant to action prediction - and are thus fragile in real-world deployment. Prior methods have addressed this challenge by exploring different model archi… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  4. arXiv:2310.05484  [pdf, other

    cs.CL cs.CY cs.LG

    IDTraffickers: An Authorship Attribution Dataset to link and connect Potential Human-Trafficking Operations on Text Escort Advertisements

    Authors: Vageesh Saxena, Benjamin Bashpole, Gijs Van Dijck, Gerasimos Spanakis

    Abstract: Human trafficking (HT) is a pervasive global issue affecting vulnerable individuals, violating their fundamental human rights. Investigations reveal that a significant number of HT cases are associated with online advertisements (ads), particularly in escort markets. Consequently, identifying and connecting HT vendors has become increasingly challenging for Law Enforcement Agencies (LEAs). To addr… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

  5. arXiv:2305.17252  [pdf, other

    cs.CV

    Generalizable Pose Estimation Using Implicit Scene Representations

    Authors: Vaibhav Saxena, Kamal Rahimi Malekshan, Linh Tran, Yotto Koga

    Abstract: 6-DoF pose estimation is an essential component of robotic manipulation pipelines. However, it usually suffers from a lack of generalization to new instances and object types. Most widely used methods learn to infer the object pose in a discriminative setup where the model filters useful information to infer the exact pose of the object. While such methods offer accurate poses, the model does not… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

  6. arXiv:2305.02763  [pdf, other

    cs.CY cs.CL cs.CR cs.LG

    VendorLink: An NLP approach for Identifying & Linking Vendor Migrants & Potential Aliases on Darknet Markets

    Authors: Vageesh Saxena, Nils Rethmeier, Gijs Van Dijck, Gerasimos Spanakis

    Abstract: The anonymity on the Darknet allows vendors to stay undetected by using multiple vendor aliases or frequently migrating between markets. Consequently, illegal markets and their connections are challenging to uncover on the Darknet. To identify relationships between illegal markets and their vendors, we propose VendorLink, an NLP-based approach that examines writing patterns to verify, identify, an… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

  7. arXiv:2110.02737  [pdf, ps, other

    cs.IT eess.SP physics.optics

    Analysis of Trade-offs in RF Photonic Links based on Multi-Bias Tuning of Silicon Photonic Ring-Assisted Mach Zehnder Modulators

    Authors: Md Jubayer Shawon, Vishal Saxena

    Abstract: Recent progress in silicon-based photonic integrated circuits (PICs) have opened new avenues for analog circuit designers to explore hybrid integration of photonics with CMOS ICs. Traditionally, optoelectronic systems are designed using discrete optics and electronics. Silicon photonic (SiP) platforms provide the opportunity to realize these systems in a compact chip-scale form factor and alleviat… ▽ More

    Submitted 27 September, 2021; originally announced October 2021.

    Comments: 11 pages, 21 figures, Updated version of this work with more experimental results will be published in other relevant journals

  8. QoS-Aware Scheduling in New Radio Using Deep Reinforcement Learning

    Authors: Jakob Stigenberg, Vidit Saxena, Soma Tayamon, Euhanna Ghadimi

    Abstract: Fifth-generation (5G) New Radio (NR) cellular networks support a wide range of new services, many of which require an application-specific quality of service (QoS), e.g. in terms of a guaranteed minimum bit-rate or a maximum tolerable delay. Therefore, scheduling multiple parallel data flows, each serving a unique application instance, is bound to become an even more challenging task compared to t… ▽ More

    Submitted 14 July, 2021; originally announced July 2021.

  9. arXiv:2102.09532  [pdf, other

    cs.CV cs.AI cs.LG

    Clockwork Variational Autoencoders

    Authors: Vaibhav Saxena, Jimmy Ba, Danijar Hafner

    Abstract: Deep learning has enabled algorithms to generate realistic images. However, accurately predicting long video sequences requires understanding long-term dependencies and remains an open challenge. While existing video prediction models succeed at generating sharp images, they tend to fail at accurately predicting far into the future. We introduce the Clockwork VAE (CW-VAE), a video prediction model… ▽ More

    Submitted 20 February, 2021; v1 submitted 18 February, 2021; originally announced February 2021.

    Comments: 17 pages, 12 figures, 4 tables

  10. arXiv:2101.06665  [pdf, other

    cs.AR cs.MS

    Brightening the Optical Flow through Posit Arithmetic

    Authors: Vinay Saxena, Ankitha Reddy, Jonathan Neudorfer, John Gustafson, Sangeeth Nambiar, Rainer Leupers, Farhad Merchant

    Abstract: As new technologies are invented, their commercial viability needs to be carefully examined along with their technical merits and demerits. The posit data format, proposed as a drop-in replacement for IEEE 754 float format, is one such invention that requires extensive theoretical and experimental study to identify products that can benefit from the advantages of posits for specific market segment… ▽ More

    Submitted 17 January, 2021; originally announced January 2021.

    Comments: To appear in ISQED 2021

  11. arXiv:2010.08651  [pdf, other

    eess.SP cs.IT cs.LG

    Reinforcement Learning for Efficient and Tuning-Free Link Adaptation

    Authors: Vidit Saxena, Hugo Tullberg, Joakim Jaldén

    Abstract: Wireless links adapt the data transmission parameters to the dynamic channel state -- this is called link adaptation. Classical link adaptation relies on tuning parameters that are challenging to configure for optimal link performance. Recently, reinforcement learning has been proposed to automate link adaptation, where the transmission parameters are modeled as discrete arms of a multi-armed band… ▽ More

    Submitted 4 May, 2021; v1 submitted 16 October, 2020; originally announced October 2020.

    Comments: 30 pages, 4 figures

  12. arXiv:2006.13878  [pdf, other

    cs.DC cs.LG

    Effective Elastic Scaling of Deep Learning Workloads

    Authors: Vaibhav Saxena, K. R. Jayaram, Saurav Basu, Yogish Sabharwal, Ashish Verma

    Abstract: The increased use of deep learning (DL) in academia, government and industry has, in turn, led to the popularity of on-premise and cloud-hosted deep learning platforms, whose goals are to enable organizations utilize expensive resources effectively, and to share said resources among multiple teams in a fair and effective manner. In this paper, we examine the elastic scaling of Deep Learning (DL)… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

  13. Continuous Learning in a Single-Incremental-Task Scenario with Spike Features

    Authors: Ruthvik Vaila, John Chiasson, Vishal Saxena

    Abstract: Deep Neural Networks (DNNs) have two key deficiencies, their dependence on high precision computing and their inability to perform sequential learning, that is, when a DNN is trained on a first task and the same DNN is trained on the next task it forgets the first task. This phenomenon of forgetting previous tasks is also referred to as catastrophic forgetting. On the other hand a mammalian brain… ▽ More

    Submitted 3 May, 2020; originally announced May 2020.

    Comments: Submitted to ICONS 2020

    Journal ref: nternational Conference on Neuromorphic Systems 2020

  14. arXiv:2004.09258  [pdf, other

    cs.LG stat.ML

    Thompson Sampling for Linearly Constrained Bandits

    Authors: Vidit Saxena, Joseph E. Gonzalez, Joakim Jaldén

    Abstract: We address multi-armed bandits (MAB) where the objective is to maximize the cumulative reward under a probabilistic linear constraint. For a few real-world instances of this problem, constrained extensions of the well-known Thompson Sampling (TS) heuristic have recently been proposed. However, finite-time analysis of constrained TS is challenging; as a result, only O(\sqrt{T}) bounds on the cumula… ▽ More

    Submitted 12 May, 2020; v1 submitted 20 April, 2020; originally announced April 2020.

    Comments: 10 pages, 2 figures, updated version of paper accepted at AISTATS2020

  15. arXiv:2002.11843  [pdf, ps, other

    cs.NE cs.LG eess.IV q-bio.NC

    A Deep Unsupervised Feature Learning Spiking Neural Network with Binarized Classification Layers for EMNIST Classification using SpykeFlow

    Authors: Ruthvik Vaila, John Chiasson, Vishal Saxena

    Abstract: End user AI is trained on large server farms with data collected from the users. With ever increasing demand for IOT devices, there is a need for deep learning approaches that can be implemented (at the edge) in an energy efficient manner. In this work we approach this using spiking neural networks. The unsupervised learning technique of spike timing dependent plasticity (STDP) using binary activa… ▽ More

    Submitted 28 October, 2020; v1 submitted 26 February, 2020; originally announced February 2020.

    Comments: A section of of this work is Submitted to IEEE TETCI 2020 Journal

  16. arXiv:1912.00982  [pdf, other

    cs.LG cs.CL stat.ML

    TX-Ray: Quantifying and Explaining Model-Knowledge Transfer in (Un-)Supervised NLP

    Authors: Nils Rethmeier, Vageesh Kumar Saxena, Isabelle Augenstein

    Abstract: While state-of-the-art NLP explainability (XAI) methods focus on explaining per-sample decisions in supervised end or probing tasks, this is insufficient to explain and quantify model knowledge transfer during (un-)supervised training. Thus, for TX-Ray, we modify the established computer vision explainability principle of 'visualizing preferred inputs of neurons' to make it usable transfer analysi… ▽ More

    Submitted 19 June, 2020; v1 submitted 2 December, 2019; originally announced December 2019.

  17. arXiv:1906.11902  [pdf, other

    cs.CV cs.LG eess.IV stat.ML

    PredNet and Predictive Coding: A Critical Review

    Authors: Roshan Rane, Edit Szügyi, Vageesh Saxena, André Ofner, Sebastian Stober

    Abstract: PredNet, a deep predictive coding network developed by Lotter et al., combines a biologically inspired architecture based on the propagation of prediction error with self-supervised representation learning in video. While the architecture has drawn a lot of attention and various extensions of the model exist, there is a lack of a critical analysis. We fill in the gap by evaluating PredNet both as… ▽ More

    Submitted 18 May, 2020; v1 submitted 14 June, 2019; originally announced June 2019.

  18. arXiv:1903.12272  [pdf, other

    cs.NE

    Deep Convolutional Spiking Neural Networks for Image Classification

    Authors: Ruthvik Vaila, John Chiasson, Vishal Saxena

    Abstract: Spiking neural networks are biologically plausible counterparts of the artificial neural networks, artificial neural networks are usually trained with stochastic gradient descent and spiking neural networks are trained with spike timing dependant plasticity. Training deep convolutional neural networks is a memory and power intensive job. Spiking networks could potentially help in reducing the powe… ▽ More

    Submitted 25 September, 2019; v1 submitted 28 March, 2019; originally announced March 2019.

  19. arXiv:1903.03234  [pdf, other

    cs.LG cs.AI stat.ML

    Dyna-AIL : Adversarial Imitation Learning by Planning

    Authors: Vaibhav Saxena, Srinivasan Sivanandan, Pulkit Mathur

    Abstract: Adversarial methods for imitation learning have been shown to perform well on various control tasks. However, they require a large number of environment interactions for convergence. In this paper, we propose an end-to-end differentiable adversarial imitation learning algorithm in a Dyna-like framework for switching between model-based planning and model-free learning from expert data. Our results… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

    Comments: 8 pages, 6 figures, pre-print

  20. arXiv:1902.11102  [pdf, other

    cs.LG cs.NI stat.ML

    Constrained Thompson Sampling for Wireless Link Optimization

    Authors: Vidit Saxena, Joseph E. Gonzalez, Ion Stoica, Hugo Tullberg, Joakim Jaldén

    Abstract: Wireless communication systems operate in complex time-varying environments. Therefore, selecting the optimal configuration parameters in these systems is a challenging problem. For wireless links, \emph{rate selection} is used to select the optimal data transmission rate that maximizes the link throughput subject to an application-defined latency constraint. We model rate selection as a stochasti… ▽ More

    Submitted 18 April, 2020; v1 submitted 28 February, 2019; originally announced February 2019.

    Comments: 11 pages, 2 figures. Revised version containing theoretical performance bounds

  21. arXiv:1802.02342  [pdf, other

    cs.NE

    Energy-Efficient CMOS Memristive Synapses for Mixed-Signal Neuromorphic System-on-a-Chip

    Authors: Vishal Saxena, Xinyu Wu, Kehan Zhu

    Abstract: Emerging non-volatile memory (NVM), or memristive, devices promise energy-efficient realization of deep learning, when efficiently integrated with mixed-signal integrated circuits on a CMOS substrate. Even though several algorithmic challenges need to be addressed to turn the vision of memristive Neuromorphic Systems-on-a-Chip (NeuSoCs) into reality, issues at the device and circuit interface need… ▽ More

    Submitted 20 April, 2018; v1 submitted 7 February, 2018; originally announced February 2018.

    Comments: This is a preprint of proceedings in IEEE International Symposium on Circuits and Systems (ISCAS), May 2018. Copyright 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See \URL{http://www.ieee.org/publications\_standards/publications/rights/index.html} for more information

  22. Dendritic-Inspired Processing Enables Bio-Plausible STDP in Compound Binary Synapses

    Authors: Xinyu Wu, Vishal Saxena

    Abstract: Brain-inspired learning mechanisms, e.g. spike timing dependent plasticity (STDP), enable agile and fast on-the-fly adaptation capability in a spiking neural network. When incorporating emerging nanoscale resistive non-volatile memory (NVM) devices, with ultra-low power consumption and high-density integration capability, a spiking neural network hardware would result in several orders of magnitud… ▽ More

    Submitted 9 January, 2018; originally announced January 2018.

  23. arXiv:1711.06819  [pdf, other

    cs.ET

    A Compact CMOS Memristor Emulator Circuit and its Applications

    Authors: Vishal Saxena

    Abstract: Conceptual memristors have recently gathered wider interest due to their diverse application in non-von Neumann computing, machine learning, neuromorphic computing, and chaotic circuits. We introduce a compact CMOS circuit that emulates idealized memristor characteristics and can bridge the gap between concepts to chip-scale realization by transcending device challenges. The CMOS memristor circuit… ▽ More

    Submitted 18 November, 2017; originally announced November 2017.

    Comments: Submitted to International Symposium of Circuits and Systems (ISCAS) 2018

  24. arXiv:1711.00705  [pdf, other

    cs.DC

    Efficient Training of Convolutional Neural Nets on Large Distributed Systems

    Authors: Sameer Kumar, Dheeraj Sreedhar, Vaibhav Saxena, Yogish Sabharwal, Ashish Verma

    Abstract: Deep Neural Networks (DNNs) have achieved im- pressive accuracy in many application domains including im- age classification. Training of DNNs is an extremely compute- intensive process and is solved using variants of the stochastic gradient descent (SGD) algorithm. A lot of recent research has focussed on improving the performance of DNN training. In this paper, we present optimization techniques… ▽ More

    Submitted 2 November, 2017; originally announced November 2017.

  25. arXiv:1708.02188  [pdf, ps, other

    cs.DC cs.AI cs.LG

    PowerAI DDL

    Authors: Minsik Cho, Ulrich Finkler, Sameer Kumar, David Kung, Vaibhav Saxena, Dheeraj Sreedhar

    Abstract: As deep neural networks become more complex and input datasets grow larger, it can take days or even weeks to train a deep neural network to the desired accuracy. Therefore, distributed Deep Learning at a massive scale is a critical capability, since it offers the potential to reduce the training time from weeks to hours. In this paper, we present a software-hardware co-optimized distributed Deep… ▽ More

    Submitted 7 August, 2017; originally announced August 2017.

  26. arXiv:1612.01491  [pdf

    cs.ET cs.NE

    Enabling Bio-Plausible Multi-level STDP using CMOS Neurons with Dendrites and Bistable RRAMs

    Authors: Xinyu Wu, Vishal Saxena

    Abstract: Large-scale integration of emerging nanoscale non-volatile memory devices, e.g. resistive random-access memory (RRAM), can enable a new generation of neuromorphic computers that can solve a wide range of machine learning problems. Such hybrid CMOS-RRAM neuromorphic architectures will result in several orders of magnitude reduction in energy consumption at a very small form factor, and herald auton… ▽ More

    Submitted 18 December, 2016; v1 submitted 5 December, 2016; originally announced December 2016.

  27. arXiv:1506.01072  [pdf

    cs.NE cs.AI cs.CV cs.ET

    Homogeneous Spiking Neuromorphic System for Real-World Pattern Recognition

    Authors: Xinyu Wu, Vishal Saxena, Kehan Zhu

    Abstract: A neuromorphic chip that combines CMOS analog spiking neurons and memristive synapses offers a promising solution to brain-inspired computing, as it can provide massive neural network parallelism and density. Previous hybrid analog CMOS-memristor approaches required extensive CMOS circuitry for training, and thus eliminated most of the density advantages gained by the adoption of memristor synapse… ▽ More

    Submitted 8 June, 2015; v1 submitted 2 June, 2015; originally announced June 2015.

    Comments: This is a preprint of an article accepted for publication in IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol 5, no. 2, June 2015

    Journal ref: IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol 5, no. 2, June 2015

  28. arXiv:1506.01069  [pdf

    cs.NE cs.ET

    A CMOS Spiking Neuron for Dense Memristor-Synapse Connectivity for Brain-Inspired Computing

    Authors: Xinyu Wu, Vishal Saxena, Kehan Zhu

    Abstract: Neuromorphic systems that densely integrate CMOS spiking neurons and nano-scale memristor synapses open a new avenue of brain-inspired computing. Existing silicon neurons have molded neural biophysical dynamics but are incompatible with memristor synapses, or used extra training circuitry thus eliminating much of the density advantages gained by using memristors, or were energy inefficient. Here w… ▽ More

    Submitted 8 June, 2015; v1 submitted 2 June, 2015; originally announced June 2015.

    Comments: This is a preprint of an article accepted for publication in International Joint Conference on Neural Networks (IJCNN) 2015

  29. arXiv:1506.00768  [pdf

    cs.NE cs.CV

    Soft Computing Techniques for Change Detection in remotely sensed images : A Review

    Authors: Madhu Khurana, Vikas Saxena

    Abstract: With the advent of remote sensing satellites, a huge repository of remotely sensed images is available. Change detection in remotely sensed images has been an active research area as it helps us understand the transitions that are taking place on the Earths surface. This paper discusses the methods and their classifications proposed by various researchers for change detection. Since use of soft co… ▽ More

    Submitted 25 September, 2018; v1 submitted 2 June, 2015; originally announced June 2015.

    Comments: 9 pages, 1 table, 1 figure

    Journal ref: International Journal of Computer Science Issues, Volume 12, Issue 2, March 2015, pp 245-253

  30. A CMOS Spiking Neuron for Brain-Inspired Neural Networks with Resistive Synapses and In-Situ Learning

    Authors: Xinyu Wu, Vishal Saxena, Kehan Zhu, Sakkarapani Balagopal

    Abstract: Nanoscale resistive memories are expected to fuel dense integration of electronic synapses for large-scale neuromorphic system. To realize such a brain-inspired computing chip, a compact CMOS spiking neuron that performs in-situ learning and computing while driving a large number of resistive synapses is desired. This work presents a novel leaky integrate-and-fire neuron design which implements th… ▽ More

    Submitted 24 November, 2015; v1 submitted 28 May, 2015; originally announced May 2015.

    Journal ref: IEEE Transactions on Circuits and Systems II: Express Briefs, 62(11), 1088-1092, 2015

  31. arXiv:1405.7771  [pdf

    cs.CV

    DEM Registration and Error Analysis using ASCII values

    Authors: Suma Dawn, Vikas Saxena, Bhu Dev Sharma

    Abstract: Digital Elevation Model (DEM), while providing a bare earth look, is heavily used in many applications including construction modeling, visualization, and GIS. Their registration techniques have not been explored much. Methods like Coarse-to-fine or pyramid making are common in DEM-to-image or DEM-to-map registration. Self-consistency measure is used to detect any change in terrain elevation and h… ▽ More

    Submitted 30 May, 2014; originally announced May 2014.

    Comments: 10 pages, 4 figures, 1 table, Proceeding of International Conference on Signal Processing and Imaging Engineering 2010, San Francisco, USA, 20-22 October 2010

  32. arXiv:1405.6662  [pdf

    cs.AI cs.CV

    Cognitive-mapping and contextual pyramid based Digital Elevation Model Registration and its effective storage using fractal based compression

    Authors: Suma Dawn, Vikas Saxena, Bhudev Sharma

    Abstract: Digital Elevation models (DEM) are images having terrain information embedded into them. Using cognitive mapping concepts for DEM registration, has evolved from this basic idea of using the mapping between the space to objects and defining their relationships to form the basic landmarks that need to be marked, stored and manipulated in and about the environment or other candidate environments, nam… ▽ More

    Submitted 9 May, 2014; originally announced May 2014.

    Comments: 17 pages, 8 tables, and 3 figures; IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 3, No 1, May 2013, ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 (www.IJCSI.org)

  33. arXiv:1405.5340  [pdf

    cs.MM

    A hybrid video quality metric for analyzing quality degradation due to frame drop

    Authors: Manish K Thakur, Vikas Saxena, J P Gupta

    Abstract: In last decade, ever growing internet technologies provided platform to share the multimedia data among different communities. As the ultimate users are human subjects who are concerned about quality of visual information, it is often desired to have good resumed perceptual quality of videos, thus arises the need of quality assessment. This paper presents a full reference hybrid video quality metr… ▽ More

    Submitted 21 May, 2014; originally announced May 2014.

    Comments: 7 pages, 9 figures

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 1, November 2012

  34. arXiv:1403.7455  [pdf

    cs.CL

    Hybrid Approach to English-Hindi Name Entity Transliteration

    Authors: Shruti Mathur, Varun Prakash Saxena

    Abstract: Machine translation (MT) research in Indian languages is still in its infancy. Not much work has been done in proper transliteration of name entities in this domain. In this paper we address this issue. We have used English-Hindi language pair for our experiments and have used a hybrid approach. At first we have processed English words using a rule based approach which extracts individual phonemes… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Comments: Proceedings of IEEE Students' Conference on Electrical, Electronics and Computer Sciences 2014

  35. arXiv:1112.0836  [pdf

    cs.CR

    Performance Study on Image Encryption Schemes

    Authors: Jolly Shah, Vikas Saxena

    Abstract: Image applications have been increasing in recent years.Encryption is used to provide the security needed for image applications. In this paper, we classify various image encryption schemes and analyze them with respect to various parameters like tunability, visual degradation, compression friendliness,format compliance, encryption ratio, speed, and cryptographic security.

    Submitted 5 December, 2011; originally announced December 2011.

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011, 349-355

  36. arXiv:1104.0800  [pdf

    cs.CR

    Video Encryption: A Survey

    Authors: Jolly Shah, Dr. Vikas Saxena

    Abstract: Multimedia data security is becoming important with the continuous increase of digital communications on internet. The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. In this paper, classification and description of various video encryption algorithms are presented. Analysis and Comparison of t… ▽ More

    Submitted 5 April, 2011; originally announced April 2011.

    Journal ref: International Journal of Computer Science Issues,Volume 8, Issue 2, 2011