Sciweavers

224 search results - page 12 / 45
» Secure Computation from Random Error Correcting Codes
Sort
View
117
Voted
CORR
2010
Springer
88views Education» more  CORR 2010»
15 years 2 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
113
Voted
WWW
2004
ACM
16 years 3 months ago
Copyright protection on the web: a hybrid digital video watermarking scheme
Video is one of the most popular data shared in the Web, and the protection of video copyright is of vast interest. In this paper, we present a comprehensive approach for protecti...
Pat Pik-Wah Chan, Michael R. Lyu, Roland T. Chin
119
Voted
ICIP
2010
IEEE
15 years 23 days ago
View synthesis based on Conditional Random Fields and graph cuts
We propose a novel method to synthesize intermediate views from two stereo images and disparity maps that is robust to errors in disparity map. The proposed method computes a plac...
Lam C. Tran, Christopher J. Pal, Truong Q. Nguyen
136
Voted
EUROMICRO
2005
IEEE
15 years 8 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
105
Voted
ICIP
2010
IEEE
15 years 23 days ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...