Sciweavers

831 search results - page 142 / 167
» Parallel error correcting codes
Sort
View
110
Voted
CRYPTO
1995
Springer
135views Cryptology» more  CRYPTO 1995»
15 years 4 months ago
Committed Oblivious Transfer and Private Multi-Party Computation
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
Claude Crépeau, Jeroen van de Graaf, Alain ...
126
Voted
DICTA
2007
15 years 2 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
123
Voted
CG
2007
Springer
15 years 16 days ago
Subdivision surface watermarking
This paper presents a robust non-blind watermarking scheme for subdivision surfaces. The algorithm works in the frequency domain, by modulating spectral coefficients of the subdi...
Guillaume Lavoué, Florence Denis, Florent D...
93
Voted
TWC
2008
108views more  TWC 2008»
15 years 12 days ago
Quasi-Optimal Channel Assignment for Real-Time Video in OFDM Wireless Systems
In this paper, real-time video transmission with quality of service (QoS) assurance over orthogonal frequency division multiplexing (OFDM) wireless systems is studied. Three quasi-...
Jun Xu, Xuemin Shen, Jon W. Mark, Jun Cai
146
Voted
MEDIAFORENSICS
2010
14 years 11 months ago
Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels
Error correction codes of suitable redundancy are used for ensuring perfect data recovery in noisy channels. For iterative decoding based methods, the decoder needs to be initiali...
Anindya Sarkar, B. S. Manjunath