Sciweavers

168 search results - page 20 / 34
» Statistics and Secret Leakage
Sort
View
MMSEC
2005
ACM
274views Multimedia» more  MMSEC 2005»
14 years 1 months ago
LSB steganalysis based on high-order statistics
We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samp...
Sorina Dumitrescu, Xiaolin Wu
MICCAI
2004
Springer
14 years 8 months ago
Vessel Segmentation Using a Shape Driven Flow
Abstract. We present a segmentation method for vessels using an implicit deformable model with a soft shape prior. Blood vessels are challenging structures to segment due to their ...
Delphine Nain, Anthony J. Yezzi, Greg Turk
DAC
2005
ACM
14 years 8 months ago
An efficient algorithm for statistical minimization of total power under timing yield constraints
Power minimization under variability is formulated as a rigorous statistical robust optimization program with a guarantee of power and timing yields. Both power and timing metrics...
Murari Mani, Anirudh Devgan, Michael Orshansky
FTEDA
2006
137views more  FTEDA 2006»
13 years 7 months ago
Statistical Performance Modeling and Optimization
As IC technologies scale to finer feature sizes, it becomes increasingly difficult to control the relative process variations. The increasing fluctuations in manufacturing process...
Xin Li, Jiayong Le, Lawrence T. Pileggi
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
13 years 11 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...