Optimization of the Key Sharing Protocol for Noiseless Public Channels without the Use of Cryptographic Assumptions. | 0 | 0.34 | 2021 |
Digital Watermarking System for Hard Cover Objects Against Cloning Attacks | 0 | 0.34 | 2021 |
Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding. | 0 | 0.34 | 2020 |
Perceptual Image Hashing: Tolerant to Brightness and Contrast Corrections Method Based on Cumulative Histogram Slicing | 0 | 0.34 | 2019 |
Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions | 0 | 0.34 | 2019 |
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels. | 0 | 0.34 | 2018 |
Steganalysis Based on Statistical Properties of the Encrypted Messages. | 0 | 0.34 | 2017 |
Detection of stegosystems using block ciphers for encryption of the embedded messages | 0 | 0.34 | 2017 |
Design of Audio Digital Watermarking System Resistant to Removal Attack. | 0 | 0.34 | 2017 |
Investigation of keyless cryptosystem proposed by dean and Goldsmith | 0 | 0.34 | 2017 |
Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization. | 0 | 0.34 | 2016 |
Design of High Speed Stegosystem Based on Trellis Codes Jointly with Generalised Viterbi Algorithm. | 0 | 0.34 | 2016 |
Secret key agreement based on a communication through wireless MIMO-based fading channels. | 0 | 0.34 | 2016 |
Using the generalised Viterbi algorithm to achieve a highly effective stegosystem for images | 0 | 0.34 | 2015 |
Analysis of Keyless Massive MIMO-based Cryptosystem Security. | 0 | 0.34 | 2015 |
Concatenated digital watermarking system robust to different removal attacks. | 0 | 0.34 | 2014 |
Wire-tap channel concept in nature and society | 0 | 0.34 | 2014 |
Audio Watermarking Based on Echo Hiding with Zero Error Probability. | 0 | 0.34 | 2013 |
A stegosystem with blind decoder based on a noisy channel | 0 | 0.34 | 2013 |
The Capacity of a Stegosystem for the Noisy Attack Channel. | 0 | 0.34 | 2012 |
A Multiple Robust Digital Watermarking System for Still Images. | 0 | 0.34 | 2012 |
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna | 2 | 0.39 | 2011 |
Stegosystems Based on Noisy Channels. | 2 | 0.43 | 2011 |
Robust Digital Watermarking System for Still Images. | 4 | 0.69 | 2011 |
Collusion-Resistant Fingerprints Based on Real Superimposed Codes. | 0 | 0.34 | 2010 |
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary | 1 | 0.35 | 2010 |
Undetectable spread-time stegosystem based on noisy channels | 1 | 0.70 | 2010 |
Collusion-resistant fingerprints based on the use of superimposed codes in real vector spaces | 0 | 0.34 | 2009 |
Wet Paper Coding for Watermarking of Binary Images | 1 | 0.40 | 2008 |
On the use of Bhattacharyya distance as a measure of the detectability of steganographic systems | 3 | 0.39 | 2008 |
On the existence of perfect stegosystems | 7 | 0.66 | 2005 |
Achievability of the Key-Capacity in a Scenario of Key Sharing | 0 | 0.34 | 2003 |
Hybrid authentication based on noisy channels | 2 | 0.41 | 2003 |
Digital Semipublic Watermarking | 0 | 0.34 | 2002 |
Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk) | 0 | 0.34 | 1992 |
Cryptanalysis of McEliece's public-key cryptosystem | 12 | 2.25 | 1991 |