Sciweavers

1094 search results - page 95 / 219
» List signature schemes
Sort
View
PCM
2005
Springer
88views Multimedia» more  PCM 2005»
14 years 3 months ago
A Robust Method for Data Hiding in Color Images
In this paper, we propose a methodology for embedding watermark image data into color images. At the transmitter, the signature image is encoded by a multiple description encoder. ...
Mohsen Ashourian, Payman Moallem, Yo-Sung Ho
ISCIS
2003
Springer
14 years 3 months ago
Multiple Description Coding for Image Data Hiding in the Spatial Domain
In this paper, we develop a robust image data hiding scheme based on multiple description coding of the signature image. At the transmitter, the signature image is encoded by balan...
Mohsen Ashourian, Yo-Sung Ho
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 4 months ago
Non-Orthogonal Transmission and Noncoherent Fusion of Censored Decisions
— In this paper, we propose a novel signaling scheme and corresponding noncoherent fusion rules for wireless sensor networks. In the proposed scheme, sensors transmit censored de...
Simon Yiu, Robert Schober
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
12 years 5 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
CCS
2010
ACM
13 years 10 months ago
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational models. It captures reasoning patterns that are common in p...
Gilles Barthe, Marion Daubignard, Bruce M. Kapron,...