Sciweavers

248 search results - page 32 / 50
» Fault Attacks on Signature Schemes
Sort
View
ICMCS
1999
IEEE
117views Multimedia» more  ICMCS 1999»
15 years 4 months ago
Fractal Transform Based Large Digital Watermark Embedding and Robust Full Blind Extraction
The aim of this demonstration is to present the ongoing performance of our R. and D. watermarking scheme software. The proposed illustrations cover a large panel of original image...
Jean-Luc Dugelay, S. Roche
TIFS
2010
130views more  TIFS 2010»
14 years 6 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
PCM
2005
Springer
88views Multimedia» more  PCM 2005»
15 years 5 months ago
A Robust Method for Data Hiding in Color Images
In this paper, we propose a methodology for embedding watermark image data into color images. At the transmitter, the signature image is encoded by a multiple description encoder. ...
Mohsen Ashourian, Payman Moallem, Yo-Sung Ho
ISCIS
2003
Springer
15 years 5 months ago
Multiple Description Coding for Image Data Hiding in the Spatial Domain
In this paper, we develop a robust image data hiding scheme based on multiple description coding of the signature image. At the transmitter, the signature image is encoded by balan...
Mohsen Ashourian, Yo-Sung Ho
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
15 years 27 days ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov