Learn More
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic landscape by enabling several security goals that were previously beyond our reach. Consequently, one of the pressing goals currently is to construct iO from well-studied standard cryptographic assumptions. In this work, we make progress in this direction by presenting a(More)
Automatic analysis of heart sounds aid physicians in the diagnosis of abnormal heart valve conditions. Segmentation, i.e. identification of first (S1) and second (S2) heart sounds, is the first step in the automatic analysis. In this work, we have proposed a segmentation method which uses energy-based and simplicity-based features computed from multi-level(More)
Video matting is defined as the process of changing the background of the video by extracting the foreground image from each frame of a video. In this paper, we propose a video matting technique which uses Ncut segmentation technique to segment the frames. Further, Sobel edge detection technique is used on the segmented frames for detecting edges.(More)
We show how to construct indistinguishability obfuscation (iO) for circuits from any non-compact functional encryption (FE) scheme with sub-exponential security against unbounded collusions. We accomplish this by giving a generic transformation from any such FE scheme into a compact FE scheme. By composing this with the transformation from sub-exponentially(More)
We show how to construct indistinguishability obfuscation (iO) for circuits from any non-compact functional encryption (FE) scheme with sub-exponential security against unbounded collusions. We accomplish this by giving a generic transformation from any such FE scheme into a compact FE scheme. By composing this with the transformation from sub-exponentially(More)
— Active Queue Management (AQM) policies are mechanisms for congestion avoidance, which pro-actively drop packets in order to provide an early congestion notification to the sources. In this paper we propose a new Adaptive Prediction based Approach for Congestion Estimation in Active Queue Management (APACE) that predicts the instantaneous queue length at a(More)
Present constructions of indistinguishability obfuscation (iO) create obfuscated programs where the size of the obfuscated program is at least a factor of a security parameter larger than the size of the original program. In this work, we construct the first iO scheme that achieves only a constant multiplica-tive overhead (in fact, the constant is 2) in the(More)