Sciweavers

78 search results - page 9 / 16
» Attacking Some Perceptual Image Hash Algorithms
Sort
View
CAMP
2005
IEEE
14 years 1 months ago
SVG Rendering for Internet Imaging
- The SVG (Scalable Vector Graphics) standard allows representing complex graphical scenes by a collection of graphic vectorial-based primitives, offering several advantages with r...
Sebastiano Battiato, Gianpiero di Blasi, Giovanni ...
ICIP
2004
IEEE
14 years 9 months ago
Rotation and cropping resilient data hiding with zernike moments
Most digital data hiding schemes are sensitive to simple geometric attacks namely rotation, cropping, and scaling. Of these, rotational attacks possess the capability to not only ...
Palak K. Amin, Koduvayur P. Subbalakshmi
SPAA
2009
ACM
14 years 8 months ago
A DoS-resilient information system for dynamic data management
Denial of service (DoS) attacks are arguably one of the most cumbersome problems in the Internet. This paper presents a distributed information system (over a set of completely co...
Matthias Baumgart, Christian Scheideler, Stefan Sc...
ICIC
2007
Springer
14 years 1 months ago
Analysis of Pi Series and Its Application to Image Encryption
Whether constant π (i.e., pi) is normal is a confusing problem without any strict theoretical demonstration except for some statistical proof. A new concept of pi series is introd...
Ting Chen, Feng Li
CHES
2004
Springer
130views Cryptology» more  CHES 2004»
14 years 1 months ago
Switching Blindings with a View Towards IDEA
Cryptographic algorithms implemented on smart-cards must be protected against side-channel attacks. Some encryption schemes and hash functions like IDEA, RC6, MD5, SHA-1 alternate ...
Olaf Neiße, Jürgen Pulkus