Sciweavers

375 search results - page 57 / 75
» On the security of an image encryption method
Sort
View
ESORICS
2005
Springer
14 years 28 days ago
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently si...
Michael Backes, Birgit Pfitzmann
IACR
2011
115views more  IACR 2011»
12 years 7 months ago
Multi-Server Oblivious RAM
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
Steve Lu, Rafail Ostrovsky
ICMCS
1999
IEEE
165views Multimedia» more  ICMCS 1999»
13 years 11 months ago
Template Based Recovery of Fourier-Based Watermarks Using Log-Polar and Log-Log Maps
Digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyrighted material. This paper describes a method for the secure and robus...
Shelby Pereira, Joseph Ó Ruanaidh, Fr&eacut...
WISA
2004
Springer
14 years 22 days ago
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
This paper addresses the problem of content-based synchronization for robust watermarking. Synchronization is a process of extracting the location to embed and detect the signature...
Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-...
ICIAP
2001
Springer
14 years 7 months ago
Eigenspace-Based Recognition of Faces: Comparisons and a New Approach
Different eigenspace-based approaches have been proposed for the recognition of faces. They differ mostly in the kind of projection method been used and in the similarity matching ...
Pablo Navarrete, Javier Ruiz-del-Solar