In this thesis, we will focus on the physical implementation of visual cryptography, which consists in sharing a secret message between several unmeaning images, so-called shadow images, at least one of them being printed. By the principle of the method, no information leaks about the message until the images are properly stacked together. As the alignment of the shadow images hampers the deployment of the visual cryptography in practice, we develop a dedicated image registration method. In contrast with existing methods, ours is not intrusive. We make use of the particular shape of the elementary constituents of the shadow images, the shares, to extract in the Fourier domain the main parameters of the geometrical transformations occurring ...
The consumer electronics market is dominated by embedded systems due to their ever-increasing proces...
M. Jean-Francois Marcotorchino, Directeur du Centre Européen de Mathématiques Appliquées (CEMAP) d’I...
Blind source separation aims at extracting unknown source signals from observations where these sour...
In this thesis, we will focus on the physical implementation of visual cryptography, which consists ...
Our society extensively relies on communications systems. Because such systems are used to exchange ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Steganography is the art of the dissimulation of a secret message in a cover medium such that the re...
From a technical point of view, the Internet is a distributed system of computers. As such, traditio...
Recent advances in micro-electro-mechanical systems (MEMS) have enabled the development of low cost,...
This thesis is about algorithmic problems arising when someone wants to imple-ment a cryptosystem ba...
Locomotor disorders comprehension is limited by the absence of dynamic 3D imaging technology. 3D ima...
The obsession of the general public for communicating devices has driven a desire to rapidly evolve ...
The consumer electronics market is dominated by embedded systems due to their ever-increasing proces...
M. Jean-Francois Marcotorchino, Directeur du Centre Européen de Mathématiques Appliquées (CEMAP) d’I...
Blind source separation aims at extracting unknown source signals from observations where these sour...
In this thesis, we will focus on the physical implementation of visual cryptography, which consists ...
Our society extensively relies on communications systems. Because such systems are used to exchange ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Steganography is the art of the dissimulation of a secret message in a cover medium such that the re...
From a technical point of view, the Internet is a distributed system of computers. As such, traditio...
Recent advances in micro-electro-mechanical systems (MEMS) have enabled the development of low cost,...
This thesis is about algorithmic problems arising when someone wants to imple-ment a cryptosystem ba...
Locomotor disorders comprehension is limited by the absence of dynamic 3D imaging technology. 3D ima...
The obsession of the general public for communicating devices has driven a desire to rapidly evolve ...
The consumer electronics market is dominated by embedded systems due to their ever-increasing proces...
M. Jean-Francois Marcotorchino, Directeur du Centre Européen de Mathématiques Appliquées (CEMAP) d’I...
Blind source separation aims at extracting unknown source signals from observations where these sour...