نتایج جستجو برای: key image

تعداد نتایج: 909039  

Journal: :International Journal of Engineering and Technology 2017

Journal: :dental research journal 0
ravi prakash sasankoti mohan navneet gill sankalp verma venkateshwar rao chawa kuber tyagi neha agarwal

the incidence of multiple myeloma (mm) affecting the jaws is 30% and on rare occasions the oral involvement can be the first indication of the disease. authors report a case of mm in a 40-yearold woman who presented with a multilocular radiolucent lesion in the left mandible initially mistaken as an ameloblastoma. conventional radiographs revealed a multilocular lesion on the molar region. comp...

2010
Abdullah M. Jaafar Azman Samsudin

Currently, most of the existing public-key encryption schemes are based on complex algorithms with heavy computations. In 1994, Naor and Shamir proposed a simple cryptography method for digital images called visual cryptography. Existing visual cryptography primitives can be considered as a special kind of secret-key cryptography that does not require heavy computations for encrypting and decry...

1998
Ping Wah Wong

We propose in this paper a public key watermarking algorithm for image integrity veri cation. This watermark is capable of detecting any change made to an image, including changes in pixel values and image size. This watermark is important for several imaging applications, including trusted camera, legal usage of images, medical archiving of images, news reporting, commercial image transaction,...

Journal: :journal of crop protection 2015
sara ghods vahhab shojaeddini

counting the population of insect pests is a key task for planning a successful integrated pest management program. most image processing and machine vision techniques in the literature are very site-specific and cannot be easily re-usable because their performances are highly related to their ground truth data. in this article a new unsupervised image processing method is proposed which is gen...

2003
Gaurav Jolly Mustafa C. Kusçu Pallavi Kokate Mohamed F. Younis

*Abstract. Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critically important. Moreover, limited energy, computing, and memory resources prohibit the use of complex security mechanisms within sensor networks. Therefore, well balancing between security level and the assoc...

Journal: :CoRR 2018
Antonia Wachter-Zeh Sven Puchinger Julian Renner

A repair of the Faure–Loidreau (FL) public-key code-based cryptosystem is proposed. The FL cryptosystem is based on the hardness of list decoding Gabidulin codes which are special rank-metric codes. We prove that the structural attack on the system by Gaborit et al. is equivalent to decoding an interleaved Gabidulin code. Since all known polynomial-time decoders for these codes fail for a large...

Journal: :IACR Cryptology ePrint Archive 2005
Kyung-Ah Shim

Recently, a number of ID-based two-party authenticated key agreement protocols which make of bilinear pairings have been proposed [3, 8, 12, 11, 14]. In this paper, we show that the Xie’s protocol [14] does not provide implicit key authentication and key-compromise impersonation resilience. Also, we point out the vulnerability of the Choi et al’s protocol [3] against signature forgery attacks.

2014
Sarmad Ullah Khan Rafiullah Khan Inam Bari Naveed Jan

Recently, wireless sensor networks have attracted the attention of research comunity due to its numerous applications especially in mobility scenarios. however it also increases the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Hence a proper key management scheme needs to be proposed to secure both information and conn...

Journal: :Applied Mathematics and Computation 2007
Fengling Han Jiankun Hu Xinghuo Yu Yi Wang

This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a twodimensional (2D) chaotic sequence obtained from multi-scroll chaotic attractors. Initial values of the chaotic attractors are served as the private key, which can be generated from the pixel distribution of the binary images of the captured fingerprints. Due to the dynamic uncer...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید