A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images.
Abdel Alim KamalRoger ZahnoAmr M. YoussefPublished in: CD-ARES Workshops (2013)
Keyphrases
- memory requirements
- image database
- image data
- image analysis
- input image
- image retrieval
- ground truth
- rigid body
- object recognition
- image classification
- computer graphics
- image collections
- image set
- test images
- image features
- three dimensional
- lighting conditions
- multiresolution
- multiple images
- image processing algorithms
- hash functions
- quantitative evaluation
- similarity measure
- image denoising
- region of interest
- smart card
- image quality