Sciweavers

381 search results - page 46 / 77
» Error-Correcting Codes in Steganography
Sort
View
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
13 years 11 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
ICIP
2002
IEEE
16 years 1 months ago
Robust still image coding using lapped transforms with block classification
Very efficient still image compression methods exist today, but most of them are not fit for transmission on error prone channels. One example of state-of-the-art robust image cod...
Arthur L. A. da Cunha, Weiler Alves Finamore, Edua...
ICC
2008
IEEE
119views Communications» more  ICC 2008»
15 years 6 months ago
Diversity Analysis of coded SVD Schemes for MIMO Spatial Multiplexing Systems
— When channel state information (CSI) is available at both transmit and receive sides, singular value decomposition (SVD) converts the MIMO channel into parallel subchannels. It...
Kyoung-Jae Lee, Inkyu Lee
ICASSP
2011
IEEE
14 years 3 months ago
A 3-layer coding scheme for biometry template protection based on spectral minutiae
—Spectral Minutiae (SM) representation enables the combination of minutiae-based fingerprint recognition systems with template protection schemes based on fuzzy commitment, but ...
Xiaoying Shao, Haiyun Xu, Raymond N. J. Veldhuis, ...
ISCAS
2007
IEEE
99views Hardware» more  ISCAS 2007»
15 years 6 months ago
A Parallel Architecture for Hermitian Decoders: Satisfying Resource and Throughput Constraints
— Hermitian Codes offer desirable properties such as large code lengths, good error-correction at high code rates, etc. The main problem in making Hermitian codes practical is to...
Rachit Agarwal, Emanuel M. Popovici, Brendan O'Fly...