Sciweavers

224 search results - page 12 / 45
» Secure Computation from Random Error Correcting Codes
Sort
View
CORR
2010
Springer
88views Education» more  CORR 2010»
13 years 6 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
WWW
2004
ACM
14 years 7 months ago
Copyright protection on the web: a hybrid digital video watermarking scheme
Video is one of the most popular data shared in the Web, and the protection of video copyright is of vast interest. In this paper, we present a comprehensive approach for protecti...
Pat Pik-Wah Chan, Michael R. Lyu, Roland T. Chin
ICIP
2010
IEEE
13 years 4 months ago
View synthesis based on Conditional Random Fields and graph cuts
We propose a novel method to synthesize intermediate views from two stereo images and disparity maps that is robust to errors in disparity map. The proposed method computes a plac...
Lam C. Tran, Christopher J. Pal, Truong Q. Nguyen
EUROMICRO
2005
IEEE
14 years 10 days ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
ICIP
2010
IEEE
13 years 4 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...