2016
DOI: 10.1016/j.jco.2015.11.005
|View full text |Cite
|
Sign up to set email alerts
|

Quiz games as a model for information hiding

Abstract: We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game. It allows in a uniform way to prove exponential lower bounds for several complexity problems.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
1
2
0
Order By: Relevance
“…The complexity paradigm arising from these works is that polynomial systems can be solved with a number of arithmetic operations which is polynomial in the Bézout number of the system. This conclusion nearly matches the lower bounds of [5], [15] and [1], under the assumption that the corresponding algorithms are "geometrically robust", namely they are universal and allow the solution of certain "limit" problems.…”
Section: Introductionsupporting
confidence: 71%
See 1 more Smart Citation
“…The complexity paradigm arising from these works is that polynomial systems can be solved with a number of arithmetic operations which is polynomial in the Bézout number of the system. This conclusion nearly matches the lower bounds of [5], [15] and [1], under the assumption that the corresponding algorithms are "geometrically robust", namely they are universal and allow the solution of certain "limit" problems.…”
Section: Introductionsupporting
confidence: 71%
“…Next, the second condition of the lemma can be rephrased by saying that the image J of J in B is not contained in any prime of B of codimension 0. By [10,Corollary 16.20], this is equivalent to (1), which finishes the proof. 2.2.…”
Section: 1mentioning
confidence: 55%
“…Compared with most existing reversible hiding algorithms, the peak value of signal-to-noise ratio of watermark information embedded in image is high. But the embedding capacity is restricted by the maximum size of the histogram, which makes the embedding capacity limited to the original image [3,12]. After the carrier image is encrypted by other two algorithms, in encrypted image, information bits are embedded in the low value, resulting in some block boundary pixels value in the image with watermark information has flipped, after being extracted image cannot be recovered completely, it not only has a large amount of calculation and but also the image quality has been some injury.…”
Section: Xueyan Wumentioning
confidence: 99%