Sciweavers

237 search results - page 18 / 48
» Which concurrent error detection scheme to choose
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
14 years 1 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...
IPPS
2006
IEEE
14 years 1 months ago
Analysis of checksum-based execution schemes for pipelined processors
The performance requirements for contemporary microprocessors are increasing as rapidly as their number of applications grows. By accelerating the clock, performance can be gained...
Bernhard Fechner
ICC
2007
IEEE
147views Communications» more  ICC 2007»
14 years 2 months ago
A New Hybrid Space-Time Block Codes and Spatial Multiplexing Scheme with Precoding
— We present a new hybrid scheme which combines space-time block codes (STBC) and spatial multiplexing (SM) to achieve both diversity and spatial multiplexing gain. We design a n...
Jong-Kyu Kim, Heunchul Lee, Inkyu Lee
ICIP
2006
IEEE
14 years 9 months ago
Towards a Robust Feature-Based Watermarking Scheme
This paper presents a feature-based watermarking scheme which is robust to geometric and common image processing attacks. The improved Harris corner detector is used to find the r...
Jonathan Weinheimer, Xiaojun Qi, Ji Qi