Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,115,606 papers from all fields of science
Search
Sign In
Create Free Account
Blind signature
Known as:
Blind Signatures
, RSA blinding attack
, Signature (disambiguation)
In cryptography a blind signature as introduced by David Chaum is a form of digital signature in which the content of a message is disguised (blinded…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Anonymous Internet banking
Blind credential
Blinding (cryptography)
CryptoNote
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
New receipt-free voting scheme using double-trapdoor commitment
Xiaofeng Chen
,
Qianhong Wu
,
+5 authors
Kwangjo Kim
Information Sciences
2011
Corpus ID: 5758029
2011
2011
Methods and automatic procedures for processing images based on blind evaluation of noise type and characteristics
V. Lukin
,
S. Abramov
,
+5 authors
J. Astola
2011
Corpus ID: 59205605
In many modern applications, methods and algorithms used for image processing require a priori knowledge or estimates of noise…
Expand
2009
2009
Blind synchronization for OFDM systems in multipath channels
T. Fusco
,
M. Tanda
IEEE Transactions on Wireless Communications
2009
Corpus ID: 22986513
In this paper we consider the problem of blind feedforward carrier-frequency offset (CFO) and symbol timing estimation for…
Expand
2009
2009
A New Introduction towards Invisible Image Watermarking on Color Image
Soumik Das
,
P. Bandyopadhyay
,
Shauvik Paul
,
Arindam Sinha Ray
,
M. Banerjee
IEEE International Advance Computing Conference
2009
Corpus ID: 15402929
Easy availability of internet, together with relatively inexpensive digital recording and storage peripherals has created an era…
Expand
2008
2008
Color Image Copyright Protection Digital Watermarking Algorithm Based on DWT & DCT
Mingwei Zhao
,
Yanzhong Dang
International Conference on Wireless…
2008
Corpus ID: 14601285
This paper combines the visual characteristics of low frequency sub-image of DWT and the ability of DCT to remove correlation…
Expand
2003
2003
EM Estimation of Scale Factor for Quantization-Based Audio Watermarking
Kiryung Lee
,
Dong Sik Kim
,
Taejeong Kim
,
Kyung-Ae Moon
International Workshop on Digital Watermarking
2003
Corpus ID: 41371822
The blind watermarking scheme extracts the embedded message without access to the host signal. Recently, efficient blind…
Expand
Highly Cited
2003
Highly Cited
2003
Steganographic system based on higher-order statistics
Roman Tzschoppe
,
R. Bäuml
,
J. Huber
,
André Kaup
IS&T/SPIE Electronic Imaging
2003
Corpus ID: 17198961
Universal blind steganalysis attempts to detect steganographic data without knowledge about the applied steganographic system…
Expand
2003
2003
Image encryption techniques based on the fractional Fourier transform
B. Hennelly
,
John T. Sheridan
SPIE Optics + Photonics
2003
Corpus ID: 119551478
The fractional Fourier transform, (FRT), is a generalisation of the Fourier transform which allows domains of mixed spatial…
Expand
2002
2002
A callgraph‐based search strategy for automated performance diagnosis
Harold W. Cain
,
B. Miller
,
B. Wylie
Concurrency and Computation
2002
Corpus ID: 8226447
We introduce a new technique for automated performance diagnosis, using the program's callgraph. We discuss our implementation of…
Expand
Highly Cited
1994
Highly Cited
1994
A new blind time-domain channel identification method based on cyclostationarity
L. Baccalá
,
S. Roy
IEEE Signal Processing Letters
1994
Corpus ID: 14812488
A blind channel identification scheme based on oversampling the channel output and employing a (discrete) cyclic correlation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE