Search

Showing total 145 results
145 results

Search Results

1. Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector

2. A cluster-based routing method with authentication capability in Vehicular Ad hoc Networks (VANETs).

3. An anti-steganalysis adaptive steganography for HEVC video based on PU partition modes.

4. Enabling zero knowledge proof by accelerating zk-SNARK kernels on GPU.

5. A secure three-factor authentication scheme for IoT environments.

6. Research on image steganography analysis based on deep learning.

7. Minimal linear codes over finite fields.

8. Lightweight JPEG image steganalysis using dilated blind-spot network.

9. Dual-domain joint optimization for universal JPEG steganography.

10. Scooby: Improved multi-party homomorphic secret sharing based on FHE.

11. An improvement to the Hasse–Weil bound and applications to character sums, cryptography and coding.

12. New distributed algorithms for fast sign detection in residue number systems (RNS).

13. Roadmap of post-quantum cryptography standardization: Side-channel attacks and countermeasures.

14. Toward high imperceptibility deep JPEG steganography based on sparse adversarial attack.

15. HEVC video information hiding scheme based on adaptive double-layer embedding strategy.

16. The third order variations on the Fibonacci universal code.

17. Optimal location using genetic algorithms for chaotic image steganography technique based on discrete framelet transform.

18. Super-isolated abelian varieties.

19. Visual cryptography scheme for secret color images with color QR codes.

20. Affine equivalence for rotation symmetric Boolean functions with variables

21. An improved two-party identity-based authenticated key agreement protocol using pairings

22. A novel natural language steganographic framework based on image description neural network.

23. A combination of color-black-and-white visual cryptography and polynomial based secret image sharing.

24. Algorithmic problems in right-angled Artin groups: Complexity and applications.

25. Binary image steganography based on joint distortion measurement.

26. Two classes of permutation trinomials with Niho exponents.

27. Ergodic functions over [formula omitted].

28. The reactive simulatability (RSIM) framework for asynchronous systems

29. A bit-plane encryption algorithm for RGB image based on modulo negabinary code and chaotic system.

30. Enhancing the security of image steganography via multiple adversarial networks and channel attention modules.

31. The c-differential uniformity and boomerang uniformity of three classes of permutation polynomials over [formula omitted].

32. On non-monomial APcN permutations over finite fields of even characteristic.

33. A fast algorithm for matrix embedding steganography.

34. Hidden information detection using decision theory and quantized samples: Methodology, difficulties and results.

35. Progressive [formula omitted] secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD.

36. Binary image steganalysis based on local texture pattern.

37. The k-subset sum problem over finite fields.

38. A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set.

39. FPGA optimized cellular automaton random number generator.

40. A novel approach for sharing multiple color images by employing Chinese Remainder Theorem.

41. CDPS: A cryptographic data publishing system.

42. A generalization of APN functions for odd characteristic.

43. Self-attention enhanced deep residual network for spatial image steganalysis.

44. A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl.

45. On the arithmetic complexity of Strassen-like matrix multiplications.

46. Intruder deducibility constraints with negation. Decidability and application to secured service compositions.

47. Generalized Hamming weights of three classes of linear codes.

48. Reachability, confluence, and termination analysis with state-compatible automata.

49. An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications.

50. Joint image compression and encryption based on order-8 alternating transforms.