A Secure Tunable-Precision Architecture for Image Processing Applications

被引:0
|
作者
Nayak, Ankita Manjunath [1 ]
Vemuri, Ranga [1 ]
机构
[1] Univ Cincinnati, Dept Elect Engn & Comp Syst, Digital Design Environm Lab, Cincinnati, OH 45221 USA
关键词
Precision tuning; Image processing; Secure authentication;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Numerous applications involving image and audio presentations, such as video games, can be made available to consumers with varying levels of precision or resolution based on the level of authorization. This paper presents a novel tunable-precision architecture for digital systems. In this architecture, computational precision can be tuned across a large number of modes. A user can pay for and receive a key that unlocks one of the modes of precision which in turn enables a certain level of audio/image presentation and user experience. We present the secure tunable-precision architecture and an image processing application to demonstrate its usage.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Architecture design of grid GIS and its applications on image processing based on LAN
    Shen, ZF
    Luo, JC
    Zhou, CH
    Cai, SH
    Zheng, J
    Chen, QX
    Ming, DP
    Sun, QH
    [J]. INFORMATION SCIENCES, 2004, 166 (1-4) : 1 - 17
  • [32] PRECISION PROCESSING OF EARTH IMAGE DATA
    BERNSTEIN, R
    STIERHOFF, GC
    [J]. AMERICAN SCIENTIST, 1976, 64 (05) : 500 - 508
  • [33] Secure image communication for network applications
    Lian, Shiguo
    Liu, Zhongxuan
    Wang, Jinwei
    Ren, Zhen
    Wang, Haila
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS, 2006, 6250
  • [34] An Architecture for Secure m-Commerce Applications
    Kounelis, Ioannis
    Baldini, Gianmarco
    Muftic, Sead
    Loeschner, Jan
    [J]. 19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 519 - 525
  • [35] Framework and architecture for secure mobile business applications
    Haller, J
    Robinson, P
    Walter, T
    Kilian-Kehr, R
    [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 413 - 416
  • [36] Design and Implementation of Accuracy Configurable Multi-Precision Multiplier Architecture for Signal Processing Applications
    Ramya, R.
    Moorthi, S.
    [J]. 2018 IEEE RECENT ADVANCES IN INTELLIGENT COMPUTATIONAL SYSTEMS (RAICS), 2018, : 89 - 93
  • [37] Secure Communication and Firewall Architecture for IoT Applications
    Maheshwari, Navinkumar
    Dagale, Haresh
    [J]. 2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2018, : 328 - 335
  • [38] Security Architecture for Secure Multicast CoAP Applications
    Park, Chang-Seop
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 3441 - 3452
  • [39] ARM TrustZone for Secure Image Processing on the Cloud
    Brito, Tiago
    Duarte, Nuno O.
    Santos, Nuno
    [J]. 2016 IEEE 35TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS WORKSHOPS (SRDSW), 2016, : 37 - 42
  • [40] Finite Precision Processing in Wireless Applications
    Novo, David
    Li, Min
    Bougard, Bruno
    Van der Perre, Liesbet
    Catthoor, Francky
    [J]. DATE: 2009 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, VOLS 1-3, 2009, : 1230 - 1233