Sciweavers

384 search results - page 35 / 77
» A Survey of Watermarking Security
Sort
View
ICIP
2008
IEEE
14 years 9 months ago
Adaptive decoding for halftone orientation-based data hiding
Halftone image watermarking techniques that allow automated extraction of the embedded watermark data are useful in a variety of document security and workflow applications. The p...
Orhan Bulan, Gaurav Sharma, Vishal Monga
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
14 years 1 months ago
Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?
This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-...
David W. Johnson, Harold Koch
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 1 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
TDHMS
2008
13 years 6 months ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini
ACSAC
2008
IEEE
14 years 2 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...