Synergy: Rethinking secure-memory design for error-correcting memories
Building trusted data-centers requires resilient memories which are protected from both
adversarial attacks and errors. Unfortunately, the state-of-the-art memory security solutions …
adversarial attacks and errors. Unfortunately, the state-of-the-art memory security solutions …
Secure and robust two-phase image authentication
SAH Tabatabaei, O Ur-Rehman… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A novel two-phase robust content-based image authentication scheme is introduced. The
proposed scheme is constructed based on a combination of hard and soft authentication …
proposed scheme is constructed based on a combination of hard and soft authentication …
[PDF][PDF] An introduction to the special issue on advances on interactive multimedia systems
Z Bojkovic, F Neri - WSEAS Transactions on Systems, 2013 - core.ac.uk
This paper proposes a new method for online identification of a nonlinear system using
RKHS models. The RKHS model is a linear combination of kernel functions applied to the …
RKHS models. The RKHS model is a linear combination of kernel functions applied to the …
A model repository for collaborative modeling with the jazz development platform
C Bartelt, G Molter, T Schumann - 2009 42nd Hawaii …, 2009 - ieeexplore.ieee.org
Today's software development projects have a huge demand for a comprehensive and
integrated support in the team-based development of models. Since they typically rely on file …
integrated support in the team-based development of models. Since they typically rely on file …
AACI: The mechanism for approximate authentication and correction of images
SAHAE Tabatabaei, O Ur-Rehman… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
Modification of images usually originates from channel noise, image processing operations
or adversary's efforts. Image authentication mechanisms protect the authenticity of images …
or adversary's efforts. Image authentication mechanisms protect the authenticity of images …
Authenticated compressive sensing imaging
The CS (Compressive Sensing) theory has been widely implemented in many areas, the
CSI (Compressive Sensing Imaging) method is one of them. In this paper, in order to design …
CSI (Compressive Sensing Imaging) method is one of them. In this paper, in order to design …
Noise tolerant image authentication with error localization and correction
O Ur-Rehman, N Zivic - 2012 50th Annual Allerton Conference …, 2012 - ieeexplore.ieee.org
Images transmitted over insecure communication channels are protected using a message
authentication code (MAC) for authenticity and integrity. Conventional MAC algorithms are in …
authentication code (MAC) for authenticity and integrity. Conventional MAC algorithms are in …
Soft authentication and correction of images
O Ur-Rehman, SAHAE Tabatabaei… - SCC 2013; 9th …, 2013 - ieeexplore.ieee.org
Two algorithms for soft authentication and correction of images are introduced in this paper.
The proposed algorithms correct a certain number of transmission errors in the image and …
The proposed algorithms correct a certain number of transmission errors in the image and …
On designing PUF-based TRNGs with known answer tests
Random numbers are widely used in cryptographic algorithms and protocols. A faulty true
random number generator (TRNG) may open a door into a system in spite of cryptographic …
random number generator (TRNG) may open a door into a system in spite of cryptographic …