Some applications of Diophantine approximations to Diophantine equations

Number Theory ◽  
1996 ◽  
pp. 189-198
Author(s):  
T.N. Shorey
1989 ◽  
Vol 54 (1) ◽  
pp. 234-263 ◽  
Author(s):  
H. Luckhardt

AbstractA previously unexplored method, combining logical and mathematical elements, is shown to yield substantial numerical improvements in the area of Diophantine approximations. Kreisel illustrated the method abstractly by noting that effective bounds on the number of elements are ensured if Herbrand terms from ineffective proofs ofΣ2-finiteness theorems satisfy certain simple growth conditions. Here several efficient growth conditions for the same purpose are presented that are actually satisfied in practice, in particular, by the proofs of Roth's theorem due to Roth himself and to Esnault and Viehweg. The analysis of the former yields an exponential bound of order exp(70ε−2d2) in place of exp(285ε−2d2) given by Davenport and Roth in 1955, whereαis (real) algebraic of degreed≥ 2 and ∣α−pq−1∣ <q−2−ε. (Thus the new bound is less than the fourth root of the old one.) The new bounds extracted from the other proof arepolynomial of low degree(inε−1and logd). Corollaries: Apart from a new bound for the number of solutions of the corresponding Diophantine equations and inequalities (among them Thue's inequality), log logqν, <Cα, εν5/6+ε, whereqνare the denominators of the convergents to the continued fraction ofα.


2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Jayashree Nair ◽  
T. Padma

This paper describes an authentication scheme that uses Diophantine equations based generation of the secret locations to embed the authentication and recovery watermark in the DWT sub-bands. The security lies in the difficulty of finding a solution to the Diophantine equation. The scheme uses the content invariant features of the image as a self-authenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark for visual authentication, both embedded securely using secret locations generated from solution of the Diophantine equations formed from the PQ sequences. The scheme is mildly robust to Jpeg compression and highly robust to Jpeg2000 compression. The scheme also ensures highly imperceptible watermarked images as the spatio –frequency properties of DWT are utilized to embed the dual watermarks.


1955 ◽  
Vol 6 (3) ◽  
pp. 208-214 ◽  
Author(s):  
Kurt Mahler

Sign in / Sign up

Export Citation Format

Share Document