Sciweavers

78 search results - page 6 / 16
» Attacking Some Perceptual Image Hash Algorithms
Sort
View
ESA
2005
Springer
114views Algorithms» more  ESA 2005»
14 years 1 months ago
Making Chord Robust to Byzantine Attacks
Chord is a distributed hash table (DHT) that requires only O(logn) links per node and performs searches with latency and message cost O(logn), where n is the number of peers in the...
Amos Fiat, Jared Saia, Maxwell Young
HVEI
2009
13 years 5 months ago
Measuring perceptual contrast in a multi-level framework
In this paper, we propose and discuss some approaches for measuring perceptual contrast in digital images. We start from previous algorithms by implementing different local measur...
Gabriele Simone, Marius Pedersen, Jon Yngve Hardeb...
CNSR
2005
IEEE
100views Communications» more  CNSR 2005»
13 years 9 months ago
Malicious Behaviour in Content-Addressable Peer-to-Peer Networks
Distributed Hash Tables (DHTs) promise to manage huge sets of key-value pairs in a Peer-to-Peer manner. The Content-Addressable Network (CAN) is a prominent variant of DHT. A crit...
Thomas Reidemeister, Klemens Böhm, Paul A. S....
JUCS
2008
107views more  JUCS 2008»
13 years 7 months ago
Metaclasses and Zoning Mechanism Applied to Handwriting Recognition
: The contribution of this paper is twofold. First we investigate the use of the confusion matrices in order to get some insight to better define perceptual zoning for character re...
Cinthia Obladen de Almendra Freitas, Luiz S. Olive...
CIT
2006
Springer
13 years 11 months ago
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform
Hash functions play the most important role in various cryptologic applications, ranging from data integrity checking to digital signatures. Our goal is to introduce a new hash fu...
Barzan Mozafari, Mohammad Hasan Savoji