Sciweavers

977 search results - page 40 / 196
» Secret image sharing
Sort
View
IVC
2006
156views more  IVC 2006»
15 years 4 months ago
Image encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques.Inthis communication,weproposea ...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud
ICIP
2007
IEEE
16 years 5 months ago
A Grey-Level Image Embedding its Color Palette
In this paper, we propose a method to embed the color information of an image in its corresponding grey-level image. The objective of this work is to allow free access to the grey...
Marc Chaumont, William Puech
AAECC
2004
Springer
76views Algorithms» more  AAECC 2004»
15 years 4 months ago
On the Security of RSA with Primes Sharing Least-Significant Bits
Abstract. We investigate the security of a variant of the RSA public-key cryptosystem called LSBS-RSA, in which the modulus primes share a large number of least-significant bits.We...
Ron Steinfeld, Yuliang Zheng
IWDW
2004
Springer
15 years 9 months ago
Watermarking Attack: Security of WSS Techniques
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
François Cayre, Caroline Fontaine, Teddy Fu...
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 10 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...