Sciweavers

151 search results - page 16 / 31
» Optimal (2, n) visual cryptographic schemes
Sort
View
IJCV
2007
194views more  IJCV 2007»
13 years 7 months ago
Self-Invertible 2D Log-Gabor Wavelets
Orthogonal and biorthogonal wavelets became very popular image processing tools but exhibit major drawbacks, namely a poor resolution in orientation and the lack of translation inv...
Sylvain Fischer, Filip Sroubek, Laurent Perrinet, ...
EMMCVPR
2011
Springer
12 years 7 months ago
Curvature Regularization for Curves and Surfaces in a Global Optimization Framework
Length and area regularization are commonplace for inverse problems today. It has however turned out to be much more difficult to incorporate a curvature prior. In this paper we pr...
Petter Strandmark, Fredrik Kahl
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
ACISP
2004
Springer
14 years 24 days ago
Single Database Private Information Retrieval with Logarithmic Communication
In this paper, we study the problem of single database private information retrieval, and present schemes with only logarithmic server-side communication complexity. Previously th...
Yan-Cheng Chang
ICIP
2004
IEEE
14 years 9 months ago
On information hiding with incomplete information about steganalysis
Suppose the information hider has a set of information hiding schemes to be employed in the presence of a set of steganalysis detectors. Let the information hider have only an inc...
Rajarathnam Chandramouli