Sciweavers

18374 search results - page 33 / 3675
» Applications for data hiding
Sort
View
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 7 months ago
A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing ...
Jau-Ji Shen, Po-Wei Hsu
DEXAW
1999
IEEE
102views Database» more  DEXAW 1999»
13 years 12 months ago
NIGELOG: Protecting Logging Information by Hiding Multiple Backups in Directories
This paper proposed a novel method to protect logging information more securely. The method, named NIGELOG, produces multiple backups of the logging information, hides them in arb...
Tetsuji Takada, Hideki Koike
ISN
1994
Springer
136views Communications» more  ISN 1994»
13 years 11 months ago
High-Level Access APIs in the OSIMIS TMN Platform: Harnessing and Hiding
There is a common unjustified belief that OSI management technology, despite being very powerful, is difficult to implement because of the complexity of the underlying service/prot...
George Pavlou, Thurain Tin, Andy Carr
DAWAK
2006
Springer
13 years 11 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
IAJIT
2010
85views more  IAJIT 2010»
13 years 6 months ago
Hiding Text Information in a Digital Image Based on Entropy Function
: The paper is concerned with hiding information into a digital image, specifically, an English text is used to be hidden into a digital grey-scale image. The purpose of this resea...
Nasser Hamad