Multimedia data security is becoming important with the continuous increase of digital communication on the internet. Without having privacy of data there is no meaning of doing communication usingâ€¦ (More)

The paired bondage number (total restrained bondage number, independent bondage number, k-rainbow bondage number) of a graph G, is the minimum number of edges whose removal from G results in a graphâ€¦ (More)

In this work, we proposed a new approach called integer sub-decomposition (ISD) based on the GLV idea to compute any multiple kP of a point P of order n lying on an elliptic curve E. This approachâ€¦ (More)

The use of elliptic curve for public key cryptosystem has been developed almost twenty years ago. The strength of the elliptic curve cryptosystem relies on the elliptic curve discrete logarithmâ€¦ (More)

2009 IEEE International Conference on Signal andâ€¦

2009

One of the significant problems in video watermarking is the Geometric attacks. The DWT (discrete wavelet transform) domain is used for proposed a novel algorithm to place invisible watermark in aâ€¦ (More)

The main aim of this work is to introduce a weaker version of pnormality called Ï€p-normality, which lies between p-normality and almost p-normality. We prove that p-normality is a topologicalâ€¦ (More)