Synergy: Rethinking secure-memory design for error-correcting memories

G Saileshwar, PJ Nair, P Ramrakhyani… - … Symposium on High …, 2018 - ieeexplore.ieee.org
Building trusted data-centers requires resilient memories which are protected from both
adversarial attacks and errors. Unfortunately, the state-of-the-art memory security solutions …

Secure and robust two-phase image authentication

SAH Tabatabaei, O Ur-Rehman… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A novel two-phase robust content-based image authentication scheme is introduced. The
proposed scheme is constructed based on a combination of hard and soft authentication …

[PDF][PDF] An introduction to the special issue on advances on interactive multimedia systems

Z Bojkovic, F Neri - WSEAS Transactions on Systems, 2013 - core.ac.uk
This paper proposes a new method for online identification of a nonlinear system using
RKHS models. The RKHS model is a linear combination of kernel functions applied to the …

A model repository for collaborative modeling with the jazz development platform

C Bartelt, G Molter, T Schumann - 2009 42nd Hawaii …, 2009 - ieeexplore.ieee.org
Today's software development projects have a huge demand for a comprehensive and
integrated support in the team-based development of models. Since they typically rely on file …

AACI: The mechanism for approximate authentication and correction of images

SAHAE Tabatabaei, O Ur-Rehman… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
Modification of images usually originates from channel noise, image processing operations
or adversary's efforts. Image authentication mechanisms protect the authenticity of images …

Authenticated compressive sensing imaging

T Wu, C Ruland - 2017 International Symposium on Networks …, 2017 - ieeexplore.ieee.org
The CS (Compressive Sensing) theory has been widely implemented in many areas, the
CSI (Compressive Sensing Imaging) method is one of them. In this paper, in order to design …

Noise tolerant image authentication with error localization and correction

O Ur-Rehman, N Zivic - 2012 50th Annual Allerton Conference …, 2012 - ieeexplore.ieee.org
Images transmitted over insecure communication channels are protected using a message
authentication code (MAC) for authenticity and integrity. Conventional MAC algorithms are in …

Soft authentication and correction of images

O Ur-Rehman, SAHAE Tabatabaei… - SCC 2013; 9th …, 2013 - ieeexplore.ieee.org
Two algorithms for soft authentication and correction of images are introduced in this paper.
The proposed algorithms correct a certain number of transmission errors in the image and …

Catalog integration made easy

PJ Marrón, G Lausen, M Weber - 2003 - dl.gi.de
In this paper, we study adaptive evaluation techniques for querying XML-based electronic
catalogs, and show, by means of experiments performed on real-world catalogs, that our …

On designing PUF-based TRNGs with known answer tests

Y Yu, E Dubrova, M Näslund… - 2018 IEEE Nordic Circuits …, 2018 - ieeexplore.ieee.org
Random numbers are widely used in cryptographic algorithms and protocols. A faulty true
random number generator (TRNG) may open a door into a system in spite of cryptographic …