Beruflich Dokumente
Kultur Dokumente
Tutorial 8
(Lecture 8)
4. Briefly describe the THREE basic approaches used for selective authentication.
6. Briefly describe the TWO basic restoration strategies: exact restoration and approximation
restoration.
7. Differentiate the following restoration approaches: embedded redundancy, self-embedding, and blind
restoration.