Sciweavers

42 search results - page 7 / 9
» A Verifiable and Detectable Secret Sharing Scheme by Using a...
Sort
View
ICCV
1999
IEEE
14 years 8 months ago
Object Recognition from Local Scale-Invariant Features
Proc. of the International Conference on Computer Vision, Corfu (Sept. 1999) An object recognition system has been developed that uses a new class of local image features. The fea...
David G. Lowe
ICC
2007
IEEE
14 years 17 days ago
Overlay Partition: Iterative Detection and Proactive Recovery
— Overlay networks provide infrastructures for a large variety of Internet applications, like file sharing, online gaming, and multimedia streaming. However, these networks ofte...
Tongqing Qiu, Edward Chan, Guihai Chen
ADHOCNOW
2005
Springer
13 years 11 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
IPPS
2003
IEEE
13 years 11 months ago
Miss Penalty Reduction Using Bundled Capacity Prefetching in Multiprocessors
While prefetch has proven itself useful for reducing cache misses in multiprocessors, traffic is often increased due to extra unused prefetch data. Prefetching in multiprocessors...
Dan Wallin, Erik Hagersten
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
13 years 11 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal