Sciweavers

271 search results - page 8 / 55
» The lattice of embedded subsets
Sort
View
IH
2007
Springer
14 years 3 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quanti...
Luis Pérez-Freire, Fernando Pérez-Go...
TIFS
2008
152views more  TIFS 2008»
13 years 9 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
SIGSOFT
1998
ACM
14 years 1 months ago
Reengineering Class Hierarchies Using Concept Analysis
The design of a class hierarchy may be imperfect. For example, a class C may contain a member m not accessed in any C-instance, an indication that m could be eliminated, or moved ...
Gregor Snelting, Frank Tip
GLOBECOM
2007
IEEE
14 years 3 months ago
Geometric Decoding Of PAM and QAM Lattices
— A geometric decoding technique for finite lattices was presented by Seethaler et al. for flat-fading multiple-input multiple-output channels in the case of linear modulations...
Michael Samuel, Michael P. Fitz
FOCS
2002
IEEE
14 years 1 months ago
Quantum Computation and Lattice Problems
We present the first explicit connection between quantum computation and lattice problems. Namely, our main result is a solution to the Unique Shortest Vector Problem (SVP) under ...
Oded Regev