Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,162,299 papers from all fields of science
Search
Sign In
Create Free Account
Blind signature
Known as:
Blind Signatures
, RSA blinding attack
, Signature (disambiguation)
In cryptography a blind signature as introduced by David Chaum is a form of digital signature in which the content of a message is disguised (blinded…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Anonymous Internet banking
Blind credential
Blinding (cryptography)
CryptoNote
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Robust and blind watermarking scheme for three dimensional anaglyph images
I. Prathap
,
R. Anitha
Computers & electrical engineering
2014
Corpus ID: 21028673
2013
2013
Malicious Website Detection Based on Honeypot Systems
Tung-Ming Koo
,
Hung-Chang Chang
,
Ya-Ting Hsu
,
Huey-Yeh Lin
IEEE International Conference on Computational…
2013
Corpus ID: 62190665
In the Internet age, every computer user is likely to inadvertently encounter highly contagious viruses. Over the past several…
Expand
2011
2011
Methods and automatic procedures for processing images based on blind evaluation of noise type and characteristics
V. Lukin
,
S. Abramov
,
+5 authors
J. Astola
2011
Corpus ID: 59205605
In many modern applications, methods and algorithms used for image processing require a priori knowledge or estimates of noise…
Expand
2009
2009
Blind synchronization for OFDM systems in multipath channels
T. Fusco
,
M. Tanda
IEEE Transactions on Wireless Communications
2009
Corpus ID: 22986513
In this paper we consider the problem of blind feedforward carrier-frequency offset (CFO) and symbol timing estimation for…
Expand
2009
2009
A New Introduction towards Invisible Image Watermarking on Color Image
Soumik Das
,
P. Bandyopadhyay
,
Shauvik Paul
,
Arindam Sinha Ray
,
M. Banerjee
IEEE International Advance Computing Conference
2009
Corpus ID: 15402929
Easy availability of internet, together with relatively inexpensive digital recording and storage peripherals has created an era…
Expand
2008
2008
Color Image Copyright Protection Digital Watermarking Algorithm Based on DWT & DCT
Mingwei Zhao
,
Yanzhong Dang
International Conference on Wireless…
2008
Corpus ID: 14601285
This paper combines the visual characteristics of low frequency sub-image of DWT and the ability of DCT to remove correlation…
Expand
2003
2003
EM Estimation of Scale Factor for Quantization-Based Audio Watermarking
Kiryung Lee
,
Dong Sik Kim
,
Taejeong Kim
,
Kyung-Ae Moon
International Workshop on Digital Watermarking
2003
Corpus ID: 41371822
The blind watermarking scheme extracts the embedded message without access to the host signal. Recently, efficient blind…
Expand
2003
2003
Image encryption techniques based on the fractional Fourier transform
B. Hennelly
,
John T. Sheridan
SPIE Optics + Photonics
2003
Corpus ID: 119551478
The fractional Fourier transform, (FRT), is a generalisation of the Fourier transform which allows domains of mixed spatial…
Expand
2000
2000
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Andreu Riera
,
J. Rifà
,
J. Borrell
Information Processing Letters
2000
Corpus ID: 30946029
Highly Cited
1994
Highly Cited
1994
A new blind time-domain channel identification method based on cyclostationarity
L. Baccalá
,
S. Roy
IEEE Signal Processing Letters
1994
Corpus ID: 14812488
A blind channel identification scheme based on oversampling the channel output and employing a (discrete) cyclic correlation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required