Sciweavers

18374 search results - page 12 / 3675
» Applications for data hiding
Sort
View
ISM
2006
IEEE
93views Multimedia» more  ISM 2006»
14 years 1 months ago
Worst Case Attack on Quantization Based Data Hiding
Currently, most quantization based data hiding algorithms are built assuming specific distributions of attacks, such as additive white Gaussian noise (AWGN), uniform noise, and s...
Ning Liu, K. P. Subbalakshmi
ICASSP
2008
IEEE
14 years 2 months ago
A new implementation of trellis coded quantization based data hiding
This paper discusses the construction and implementation problem of trellis coded quantization (TCQ) based data hiding. We explore the robustness and distortion of data hiding by ...
Xiaofeng Wang, Xiao-Ping Zhang
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
14 years 1 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
QEST
2007
IEEE
14 years 1 months ago
A Productivity Centered Tools Framework for Application Performance Tuning
Our productivity centered performance tuning framework for HPC applications comprises of three main components: (1) a versatile source code, performance metrics, and performance d...
Hui-Fang Wen, Simone Sbaraglia, Seetharami Seelam,...
ICIP
2000
IEEE
14 years 9 months ago
An Information-Theoretic Model for Image Watermarking and Data Hiding
An information?theoretic model for image watermarking and data hiding systems is presented in this paper. The fundamental capacity limits of these systems are determined by the st...
Gen-Iu. Lin, Mehmet Kivanç Mihçak, P...