Loading...
Search for: efficient-schemes
0.003 seconds

    Interpolation of steganographic schemes

    , Article Signal Processing ; Vol. 98 , May , 2014 , pp. 23-36 ; ISSN: 01651684 Gholampour, I ; Khosravi, K ; Sharif University of Technology
    Abstract
    Many high performance steganographic schemes work at a limited or sparsely distributed set of embedding rates. We have shown that some steganographic changes will be wasted as these schemes are utilized individually for messages of various lengths. To measure the wasted changes and compare different schemes in this respect, we have built a framework based on two new criteria: the Relative Change Waste (RCW) and the Expected Changes per Pixel (ECP). To decrease the wasted changes a systematic combination of schemes is introduced and proved to be equivalent to nonlinear interpolation of points in a two-dimensional space. We have proved that a special case which leads to a linear interpolation... 

    Minimum cost multiple multicast network coding with quantized rates

    , Article Computer Networks ; Volume 57, Issue 5 , 2013 , Pages 1113-1123 ; 13891286 (ISSN) Raayatpanah, M. A ; Salehi Fathabadi, H ; Khalaj, B. H ; Khodayifar, S ; Sharif University of Technology
    2013
    Abstract
    In this paper, we consider multiple multicast sessions with intra-session network coding where rates over all links are integer multiples of a basic rate. Although having quantized rates over communication links is quite common, conventional minimum cost network coding problem cannot generally result in quantized solutions. In this research, the problem of finding minimum cost transmission for multiple multicast sessions with network coding is addressed. It is assumed that the rate of coded packet injection at every link of each session takes quantized values. First, this problem is formulated as a mixed integer linear programming problem, and then it is proved that this problem is strongly... 

    FMNV continuous non-malleable encoding scheme is more efficient than believed

    , Article 13th International ISC Conference on Information Security and Cryptology, 7 September 2016 through 8 September 2016 ; 2016 , Pages 72-78 ; 9781509039494 (ISBN) Mortazavi, A. S ; Salmasizadeh, M ; Daneshgar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Non-malleable codes are kind of encoding schemes which are resilient to tampering attacks. The main idea behind the non-malleable coding is that the adversary can't be able to obtain any valuable information about the message. Non-malleable codes are used in tamper resilient cryptography and protecting memory against tampering attacks. Several kinds of definitions for the non-malleability exist in the literature. The Continuous non-malleability is aiming to protect messages against the adversary who issues polynomially many tampering queries. The first continuous non-malleable encoding scheme has been proposed by Faust et al. (FMNV) in 2014. In this paper, we propose a new method for proving... 

    BLESS: A simple and efficient scheme for prolonging PCM lifetime

    , Article 53rd Annual ACM IEEE Design Automation Conference, DAC 2016, 5 June 2016 through 9 June 2016 ; Volume 05-09 , June-2016 , 2016 ; 0738100X (ISSN); 9781450342360 (ISBN) Asadinia, M ; Jalili, M ; Sarbazi Azad, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Limited endurance problem and low cell reliability are main challenges of phase change memory (PCM) as an alternative to DRAM. To further prolong the lifetime of a PCM device, there exist a number of techniques that can be grouped in two categories: 1) reducing the write rate to PCM cells, and 2) handling cell failures when faults occur. Our experiments confirm that during write operations, an extensive non-uniformity in bit ips is exhibited. To reduce this non-uniformity, we present byte-level shifting scheme (BLESS) which reduces write pressure over hot cells of blocks. Additionally, this shifting mechanism can be used for error recovery purpose by using the MLC capability of PCM and...