Sciweavers

384 search results - page 15 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
ICIP
2005
IEEE
16 years 3 months ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
PQCRYPTO
2010
250views Cryptology» more  PQCRYPTO 2010»
15 years 5 months ago
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
Abstract. We propose a variant of the “bonsai tree” signature scheme, a latticebased existentially unforgeable signature scheme in the standard model. Our construction offers ...
Markus Rückert
APPROX
2004
Springer
88views Algorithms» more  APPROX 2004»
15 years 7 months ago
A Stateful Implementation of a Random Function Supporting Parity Queries over Hypercubes
Abstract. Motivated by an open problem recently suggested by Goldreich et al., we study truthful implementations of a random binary function supporting compound XOR queries over su...
Andrej Bogdanov, Hoeteck Wee
ICPR
2008
IEEE
16 years 3 months ago
Efficient implementation of SVM for large class problems
Multiclass classification is an important problem in pattern recognition. Hierarchical SVM classifiers such as DAG-SVM and BHC-SVM are popular in solving multiclass problems. Howe...
Prabakaran Ilayaraja, N. V. Neeba, C. V. Jawahar
ICCV
2001
IEEE
16 years 3 months ago
Gradient Vector Flow Fast Geodesic Active Contours
This paper proposes a new front propagation flow for boundary extraction. The proposed framework is inspired by the geodesic active contour model and leads to a paradigm that is r...
Nikos Paragios, Olivier Mellina-Gottardo, Visvanat...