scispace - formally typeset
Search or ask a question

Showing papers by "Charles G. Boncelet published in 2001"


Proceedings ArticleDOI
28 Oct 2001
TL;DR: A new method based on a computationally simple message authentication code and the generation of a chain of keys that have a limited lifetime is presented, which minimizes power and memory usage without compromising the security of the key chain.
Abstract: In this paper, we present a new method for authenticating messages. The method is suitable in situations where severe power or computational constraints prevent the use of conventional authentication algorithms. It is based on a computationally simple message authentication code (MAC) and the generation of a chain of keys that have a limited lifetime. Since the generation of keys is computationally intensive in comparison to the MAC, many messages may be authenticated during the lifespan of a single key. This minimizes power and memory usage without compromising the security of the key chain. Applicable scenarios for this fast, low power authentication are also described.

5 citations


Proceedings ArticleDOI
07 Oct 2001
TL;DR: By combining the various algorithms, the gzip, bzip2, and rk compressors obtain compression that is 15% better than JPEG-LS alone.
Abstract: We present a two-part method for lossless image compression: the first is a simple transformation based on JPEG-LS and the second is the use of a general purpose file compressor such as gzip, bzip2 or rk. The transformation is invertible and uses only integer arithmetic. It achieves no compression directly; however, on some images, it can significantly reduce the entropy. The gzip, bzip2, and rk compressors, with and without the transformation, are tested against JPEG-LS on a standard data set. Overall rk (both with and without the transformation) is best. Furthermore, by combining the various algorithms, we obtain compression that is 15% better than JPEG-LS alone.

3 citations


ReportDOI
01 Apr 2001
TL;DR: A modulation technique to embed a binary bitstream within a real-valued Gaussian noise sequence that possesses an optimal minimum distance property that promotes accurate detection when the sequence has been exposed to noise.
Abstract: : We present a modulation technique to embed a binary bitstream within a real-valued Gaussian noise sequence. The modulation produces a sequence which possesses an optimal minimum distance property that promotes accurate detection when the sequence has been exposed to noise. Because the modulated sequence possesses Gaussian properties and has low power, it is difficult for unintended parties to intercept and detect the signal. The technique can be used to hide information in a signal that is then added to a carrier for a variety of applications.