Sciweavers

236 search results - page 6 / 48
» From Weak to Strong Watermarking
Sort
View
ISCAS
2003
IEEE
97views Hardware» more  ISCAS 2003»
14 years 3 months ago
Watermark re-synchronization using log-polar mapping of image autocorrelation
Many watermarking algorithms embed the watermark into the image as contiguous non-overlapping tiles. This tiling structure forms an implicit synchronization template that can be r...
Adnan M. Alattar, Joel Meyer
IPL
2006
87views more  IPL 2006»
13 years 9 months ago
Strongly secure ramp secret sharing schemes for general access structures
Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly...
Mitsugu Iwamoto, Hirosuke Yamamoto
ICIP
2003
IEEE
14 years 3 months ago
A SR-based radon transform to extract weak lines from noise images
The Radon transform is able to transform two dimensional images with lines into a space of line parameters, where each line in the image will give a peak positioned at the corresp...
Qinghua Ye, Haining Huang, Xinyi He, Chimhua Zhang
TCS
2010
13 years 8 months ago
Strong normalization property for second order linear logic
The paper contains the first complete proof of strong normalization (SN) for full second order linear logic (LL): Girard’s original proof uses a standardization theorem which i...
Michele Pagani, Lorenzo Tortora de Falco
TCC
2009
Springer
112views Cryptology» more  TCC 2009»
14 years 10 months ago
Oblivious Transfer from Weak Noisy Channels
Various results show that oblivious transfer can be implemented using the assumption of noisy channels. Unfortunately, this assumption is not as weak as one might think, because i...
Jürg Wullschleger