Sciweavers

1094 search results - page 152 / 219
» List signature schemes
Sort
View
ICAPR
2009
Springer
14 years 2 months ago
Color Image Retrieval Using M-Band Wavelet Transform Based Color-Texture Feature
—Feature Extraction algorithm is a very important component of any retrieval scheme. We propose M-band Wavelet Transform based feature extraction algorithm in this paper. The MxM...
Malay Kumar Kundu, Priyank Bagrecha
IMA
2009
Springer
152views Cryptology» more  IMA 2009»
14 years 2 months ago
Double-Exponentiation in Factor-4 Groups and Its Applications
In previous work we showed how to compress certain prime-order subgroups of the cyclotomic subgroups of orders 22m + 1 of the multiplicative groups of F∗ 24m by a factor of 4. We...
Koray Karabina
ICDAR
2007
IEEE
14 years 2 months ago
Curvelets Based Queries for CBIR Application in Handwriting Collections
This paper presents a new use of the Curvelet transform as a multiscale method for indexing linear singularities and curved handwritten shapes in documents images. As it belongs t...
Guillaume Joutel, Véronique Eglin, St&eacut...
ISW
2005
Springer
14 years 1 months ago
A Privacy Preserving Rental System
Abstract. Rental records contain much sensitive information on individuals, so if abused by the rental service providers, user privacy could be jeopardized. To mitigate this concer...
Yanjiang Yang, Beng Chin Ooi
WCC
2005
Springer
172views Cryptology» more  WCC 2005»
14 years 1 months ago
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
Abstract. The Matsumoto-Imai (MI) cryptosystem was the first multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarin...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...