Sciweavers

384 search results - page 15 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
ICIP
2005
IEEE
16 years 1 months ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
PQCRYPTO
2010
250views Cryptology» more  PQCRYPTO 2010»
15 years 3 months ago
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
Abstract. We propose a variant of the “bonsai tree” signature scheme, a latticebased existentially unforgeable signature scheme in the standard model. Our construction offers ...
Markus Rückert
APPROX
2004
Springer
88views Algorithms» more  APPROX 2004»
15 years 5 months ago
A Stateful Implementation of a Random Function Supporting Parity Queries over Hypercubes
Abstract. Motivated by an open problem recently suggested by Goldreich et al., we study truthful implementations of a random binary function supporting compound XOR queries over su...
Andrej Bogdanov, Hoeteck Wee
ICPR
2008
IEEE
16 years 28 days ago
Efficient implementation of SVM for large class problems
Multiclass classification is an important problem in pattern recognition. Hierarchical SVM classifiers such as DAG-SVM and BHC-SVM are popular in solving multiclass problems. Howe...
Prabakaran Ilayaraja, N. V. Neeba, C. V. Jawahar
ICCV
2001
IEEE
16 years 1 months ago
Gradient Vector Flow Fast Geodesic Active Contours
This paper proposes a new front propagation flow for boundary extraction. The proposed framework is inspired by the geodesic active contour model and leads to a paradigm that is r...
Nikos Paragios, Olivier Mellina-Gottardo, Visvanat...