Now showing items 1-6 of 6

    • Classification of quantum cryptography 

      Acharya, Jaykumari (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Modern Classical Cryptography is divided into two parts. The first part is Asymmetric (public-key) cryptography and the second is Symmetric (private or secret-key) cryptography. In spite of its popularity public-key ...
    • hybrid approach to digital image watermarking using informed coding, informed embedding and spread spectrum 

      Dey, Nayan Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      The growth and popularity of the Internet has led to the data storage of multimedia data (audio, image and video) in digital form. The digitization form of multimedia data can be copied easily and then distributed again ...
    • Hybrid approach to digital image watermarking using singular value decomposition and spread spectrum 

      Bhandari, Kunal (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      We have seen an explosive growth in digitization of multimedia (image, audio and video) content and data exchange in the Internet. Consequently, digital data owners are able to massively transfer multimedia documents across ...
    • Performance of MIMO in correlated rayleigh flat fading channels 

      Jain, Alok (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      The recent interest in Multiple Input Multiple Output (MIMO) communication systems was initiated by the theoretical work of Telatar. The development in the field of random matrix theory is the basis of these studies. The ...
    • Space-time coding techniques for multiple antenna communications 

      Shenoy, Shakti Prasad (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Mobile communications has seen an explosive growth in the past decade. The reason for this growth can be traced to the increasing demand by the consumers for communication systems capable of exchanging information “anytime, ...
    • Technique to improve revocation mechanism and enhancement of CA's services 

      Thacker, Grishma D. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Public Key Cryptography [PKC] is becoming popular in the world of security because of its promising features like authentication and non-repudiation along with integrity and data confidentiality. It has been possible to ...