Sciweavers

948 search results - page 174 / 190
» Attacking cryptographic schemes based on
Sort
View
PCM
2005
Springer
88views Multimedia» more  PCM 2005»
14 years 1 months ago
A Robust Method for Data Hiding in Color Images
In this paper, we propose a methodology for embedding watermark image data into color images. At the transmitter, the signature image is encoded by a multiple description encoder. ...
Mohsen Ashourian, Payman Moallem, Yo-Sung Ho
ICCD
2007
IEEE
152views Hardware» more  ICCD 2007»
13 years 11 months ago
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors
As application-specific instruction set processors (ASIPs) are being increasingly used in mobile embedded systems, the ubiquitous networking connections have exposed these systems...
Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi
IJNSEC
2008
69views more  IJNSEC 2008»
13 years 8 months ago
Proof of Forward Security for Password-based Authenticated Key Exchange
Recently, M. Abdalla et al. proposed a slightly different variant of AuthA, based on the scheme proposed by E. Bresson et al., and provided the first complete proof of forward-sec...
Shuhua Wu, Yuefei Zhu
JMM2
2008
228views more  JMM2 2008»
13 years 7 months ago
Adaptive AC-Coefficient Prediction for Image Compression and Blind Watermarking
In this work, an adaptive image compression algorithm is proposed based on the prediction of AC coefficients in Discrete Cosine Transform (DCT) block during reconstruction of image...
Kilari Veera Swamy, S. Srinivas Kumar
SAC
2008
ACM
13 years 7 months ago
Continuous k-dominant skyline computation on multidimensional data streams
Skyline queries are important due to their usefulness in many application domains. However, by increasing the number of attributes, the probability that a tuple dominates another ...
Maria Kontaki, Apostolos N. Papadopoulos, Yannis M...