Toward construction-based data hiding: from secrets to fingerprint images

S Li, X Zhang - IEEE Transactions on Image Processing, 2018 - ieeexplore.ieee.org
Data hiding usually involves the alteration of a cover signal for embedding a secret
message. In this paper, we propose a construction-based data hiding technique which …

Theory behind quantum error correcting codes: An overview

SS Garani, PJ Nadkarni, A Raina - Journal of the Indian Institute of …, 2023 - Springer
Quantum information processing is now a well-evolved field of study with roots to quantum
physics that has significantly evolved from pioneering works over almost more than a …

List-decodable coded computing: Breaking the adversarial toleration barrier

M Soleymani, RE Ali, H Mahdavifar… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
We consider the problem of coded computing, where a computational task is performed in a
distributed fashion in the presence of adversarial workers. We propose techniques to break …

Channels engineering in magnetic recording: From theory to practice

SS Garani, B Vasić - IEEE BITS the Information Theory …, 2023 - ieeexplore.ieee.org
Information theory, coding theory, and signal processing have significantly shaped magnetic
read/write channels engineering through a chronological sequence of innovations and …

Constructions of rank modulation codes

A Mazumdar, A Barg, G Zemor - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Rank modulation is a way of encoding information to correct errors in flash memory devices
as well as impulse noise in transmission lines. Modeling rank modulation involves …

Optimization by decoded quantum interferometry

SP Jordan, N Shutty, M Wootters, A Zalcman… - arXiv preprint arXiv …, 2024 - arxiv.org
We introduce Decoded Quantum Interferometry (DQI), a quantum algorithm for reducing
classical optimization problems to classical decoding problems by exploiting structure in the …

ApproxIFER: A model-agnostic approach to resilient and robust prediction serving systems

M Soleymani, RE Ali, H Mahdavifar… - Proceedings of the AAAI …, 2022 - ojs.aaai.org
Due to the surge of cloud-assisted AI services, the problem of designing resilient prediction
serving systems that can effectively cope with stragglers and minimize response delays has …

A non-commutative cryptosystem based on quaternion algebras

K Bagheri, MR Sadeghi, D Panario - Designs, Codes and Cryptography, 2018 - Springer
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras.
This cryptosystem uses bivariate polynomials as the underling ring. The multiplication …

Key equations for list decoding of Reed–Solomon codes and how to solve them

P Beelen, K Brander - Journal of Symbolic Computation, 2010 - Elsevier
A Reed–Solomon code of length n can be list decoded using the well-known Guruswami–
Sudan algorithm. By a result of Alekhnovich (2005) the interpolation part in this algorithm …

High-speed RS (255, 239) decoder based on LCC decoding

F Garcia-Herrero, J Valls, PK Meher - Circuits, Systems, and Signal …, 2011 - Springer
Abstract Algebraic Soft-Decision Decoding (ASD) of Reed–Solomon (RS) codes provides
higher coding gain over the conventional hard-decision decoding (HDD), but involves high …