Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
In human speech production, the voice source contains important non-lexical information, especially relating to a speaker's voice quality. In this study, direct measurements ...
3D geological models commonly built to manage natural resources are much affected by uncertainty because most of the subsurface is inaccessible to direct observation. Appropriate ...
Snakes, or active contours, are used extensively in
computer vision and image processing applications, particularly
to locate object boundaries. Problems associated with initiali...
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...