Sciweavers

5752 search results - page 190 / 1151
» Informative Labeling Schemes
Sort
View
PCM
2001
Springer
110views Multimedia» more  PCM 2001»
15 years 8 months ago
A Synchronous Fragile Watermarking Scheme for Erroneous Q-DCT Coefficients Detection
In video communications over error introducing channels, error concealment techniques are widely applied in video decoder for good subjective images output. However, a damaged MB ...
Minghua Chen, Yun He
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
15 years 5 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
137
Voted
WCE
2007
15 years 4 months ago
A VC-Based Copyright Protection Scheme for Digital Images of Multi-Authorship
—Digital watermarking is a technique for protecting intellectual property of digital information. However, when a work is created by multiple authors, digital watermarking may su...
Shu-Fen Tu, Ching-Sheng Hsu
127
Voted
INFORMATICALT
2007
119views more  INFORMATICALT 2007»
15 years 3 months ago
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
The notion of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004. In concurrent signature schemes, two entities can produce t...
Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huan...
IJNSEC
2011
143views more  IJNSEC 2011»
14 years 10 months ago
Probable Security Proof of A Blind Signature Scheme over Braid Groups
In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...
Girraj Kumar Verma