Sciweavers

25 search results - page 4 / 5
» Authentication of LZ-77 Compressed Data
Sort
View
TIT
2010
130views Education» more  TIT 2010»
13 years 21 days ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar
MMSEC
2006
ACM
216views Multimedia» more  MMSEC 2006»
13 years 12 months ago
Exposing digital forgeries in video by detecting double MPEG compression
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Weihong Wang, Hany Farid
SSWMC
2004
13 years 7 months ago
Lossless data embedding with file size preservation
In lossless watermarking, it is possible to completely remove the embedding distortion from the watermarked image and recover an exact copy of the original unwatermarked image. Lo...
Jessica J. Fridrich, Miroslav Goljan, Qing Chen, V...
CCS
2004
ACM
13 years 11 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
ICIP
2000
IEEE
14 years 7 months ago
Optimal Design of Transform Coders and Quantizers for Image Classification
In a variety of applications (including automatic target recognition) image classification algorithms operate on compressed image data. This paper explores the design of optimal t...
Soumya Jana, Pierre Moulin