Sciweavers

667 search results - page 2 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
IWANN
2005
Springer
13 years 11 months ago
Robust Blind Image Watermarking with Independent Component Analysis: A Embedding Algorithm
Abstract. The authors propose a new solution to the blind robust watermarking of digital images. In this approach we embed the watermark into the independent components of the imag...
Juan José Murillo-Fuentes, Rafael Boloix-To...
ICIP
2009
IEEE
14 years 6 months ago
Perfomance Analysis Of The Fridrich-goljan Self-embedding Authentication Method
A performance analysis of the authentication method proposed by J. Fridrich and M. Goljan is carried out. This method has the particular feature that both the embedder and the det...
ITNG
2007
IEEE
13 years 12 months ago
SPA resistant Elliptic Curve Cryptosystem using Addition Chains
: There has been a lot of interest in recent years in the problems faced by cryptosystems due to side channel attacks. Algorithms for elliptic curve point scalar multiplication suc...
Andrew Byrne, Nicolas Meloni, Francis M. Crowe, Wi...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
13 years 12 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ICASSP
2011
IEEE
12 years 9 months ago
A robust quantization method using a robust Chinese remainder theorem for secret key generation
Traditional channel quantization based methods for encryption key generation usually suffer from the quantization error which may decrease the key agreement ratio between authoriz...
Wenjie Wang, Chen Wang, Xiang-Gen Xia