Sciweavers

2449 search results - page 241 / 490
» Tensor Embedding Methods
Sort
View
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 9 months ago
Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints
In this paper, we propose a preprocessing method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure family. The strength of our method i...
Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger,...
ICMCS
2006
IEEE
178views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Spatially Adaptive Wavelet Thresholding for Image Watermarking
In this paper, we introduce a new robust image watermarking technique based on the Discrete Wavelet Transform (DWT). The proposed method extends the concept of image denoising to ...
Mahmood Al-khassaweneh, Selin Aviyente
TIFS
2010
120views more  TIFS 2010»
14 years 9 months ago
Quantitative Structural Steganalysis of Jsteg
Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding changes introduced by steganography. In this paper, we propose two new cla...
Jan Kodovský, Jessica J. Fridrich
ICCV
2007
IEEE
16 years 4 months ago
Graph Based Discriminative Learning for Robust and Efficient Object Tracking
Object tracking is viewed as a two-class 'one-versusrest' classification problem, in which the sample distribution of the target is approximately Gaussian while the back...
Xiaoqin Zhang, Weiming Hu, Stephen J. Maybank, Xi ...
CASES
2001
ACM
15 years 6 months ago
Efficient longest executable path search for programs with complex flows and pipeline effects
Current development tools for embedded real-time systems do not efficiently support the timing aspect. The most important timing parameter for scheduling and system analysis is th...
Friedhelm Stappert, Andreas Ermedahl, Jakob Engblo...