Sciweavers

375 search results - page 41 / 75
» On the security of an image encryption method
Sort
View
PICS
2001
14 years 11 months ago
An Autosophy Image Content-Based Television System
A first television system based on the Autosophy information theory is now being tested. The new television marks a major theoretical break from conventional television based on t...
Klaus Holtz, Eric Holtz
PKC
1999
Springer
115views Cryptology» more  PKC 1999»
15 years 2 months ago
Decision Oracles are Equivalent to Matching Oracles
One of the key directions in complexity theory which has also filtered through to cryptographic research, is the effort to classify related but seemingly distinct notions. Separa...
Helena Handschuh, Yiannis Tsiounis, Moti Yung
ICIP
2001
IEEE
15 years 11 months ago
A hierarchical image authentication watermark with improved localization and security
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to imp...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
DBSEC
2010
196views Database» more  DBSEC 2010»
14 years 6 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
HOST
2009
IEEE
14 years 7 months ago
Experiences in Hardware Trojan Design and Implementation
Abstract-- We report our experiences in designing and implementing several hardware Trojans within the framework of the Embedded System Challenge competition that was held as part ...
Yier Jin, Nathan Kupp, Yiorgos Makris