Sciweavers

1538 search results - page 163 / 308
» Relative Randomness and Cardinality
Sort
View
IWDW
2004
Springer
15 years 3 months ago
A Multi-feature Based Invertible Authentication Watermarking for JPEG Images
: Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this p...
Deng-Pan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
15 years 3 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
PKC
2004
Springer
95views Cryptology» more  PKC 2004»
15 years 3 months ago
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups
Boneh and Venkatesan have proposed a polynomial time algorithm in a non-uniform model for recovering a ”hidden” element α ∈ IFp, where p is prime, from very short strings of...
Igor Shparlinski, Arne Winterhof
SCVMA
2004
Springer
15 years 3 months ago
Motion Detection Using Wavelet Analysis and Hierarchical Markov Models
This paper deals with the motion detection problem. This issue is of key importance in many application fields. To solve this problem, we compute the dominant motion in the sequen...
Cédric Demonceaux, Djemâa Kachi-Akkou...
ISVLSI
2003
IEEE
157views VLSI» more  ISVLSI 2003»
15 years 3 months ago
Joint Minimization of Power and Area in Scan Testing by Scan Cell Reordering
This paper describes a technique for re-ordering of scan cells to minimize power dissipation that is also capable of reducing the area overhead of the circuit compared to a random...
Shalini Ghosh, Sugato Basu, Nur A. Touba