Sciweavers

151 search results - page 16 / 31
» Optimal (2, n) visual cryptographic schemes
Sort
View
97
Voted
IJCV
2007
194views more  IJCV 2007»
14 years 9 months ago
Self-Invertible 2D Log-Gabor Wavelets
Orthogonal and biorthogonal wavelets became very popular image processing tools but exhibit major drawbacks, namely a poor resolution in orientation and the lack of translation inv...
Sylvain Fischer, Filip Sroubek, Laurent Perrinet, ...
EMMCVPR
2011
Springer
13 years 9 months ago
Curvature Regularization for Curves and Surfaces in a Global Optimization Framework
Length and area regularization are commonplace for inverse problems today. It has however turned out to be much more difficult to incorporate a curvature prior. In this paper we pr...
Petter Strandmark, Fredrik Kahl
97
Voted
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
ACISP
2004
Springer
15 years 3 months ago
Single Database Private Information Retrieval with Logarithmic Communication
In this paper, we study the problem of single database private information retrieval, and present schemes with only logarithmic server-side communication complexity. Previously th...
Yan-Cheng Chang
ICIP
2004
IEEE
15 years 11 months ago
On information hiding with incomplete information about steganalysis
Suppose the information hider has a set of information hiding schemes to be employed in the presence of a set of steganalysis detectors. Let the information hider have only an inc...
Rajarathnam Chandramouli