Sciweavers

3898 search results - page 216 / 780
» On the Bit Extraction Problem
Sort
View
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
15 years 10 months ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert
ICC
2007
IEEE
15 years 9 months ago
Constrained Wavelet Tree Quantization for Image Watermarking
This paper investigates the operations of the wavelet tree based quantization and proposes a constrained wavelet tree quantization for image watermarking. The wavelet coefficients ...
Min-Jen Tsai, Chen-Long Lin
VTC
2007
IEEE
138views Communications» more  VTC 2007»
15 years 9 months ago
Applicability of UWB Double Directional Propagation Modeling for Evaluating UWB Transmission Performance
Abstract— This paper investigates the applicability of deterministic ultra wideband (UWB) propagation modeling for evaluating UWB system performances. The modeling explores the w...
Katsuyuki Haneda, Jun-ichi Takada, Takehiko Kobaya...
ACCV
2007
Springer
15 years 9 months ago
High Capacity Watermarking in Nonedge Texture Under Statistical Distortion Constraint
High-capacity image watermarking scheme aims at maximize bit rate of hiding information, neither eliciting perceptible image distortion nor facilitating special watermark attack. T...
Fan Zhang, Wenyu Liu, Chunxiao Liu
COCO
2004
Springer
118views Algorithms» more  COCO 2004»
15 years 8 months ago
Towards the Classical Communication Complexity of Entanglement Distillation Protocols with Incomplete Information
Entanglement is an essential resource for quantum communication and quantum computation, similar to shared random bits in the classical world. Entanglement distillation extracts n...
Andris Ambainis, Ke Yang