Sciweavers

18374 search results - page 46 / 3675
» Applications for data hiding
Sort
View
WIOPT
2005
IEEE
14 years 3 months ago
Secure Comparison of Encrypted Data in Wireless Sensor Networks
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...
Mithun Acharya, Joao Girão, Dirk Westhoff
ICDE
2012
IEEE
221views Database» more  ICDE 2012»
12 years 2 days ago
DPCube: Releasing Differentially Private Data Cubes for Health Information
—We demonstrate DPCube, a component in our Health Information DE-identification (HIDE) framework, for releasing differentially private data cubes (or multi-dimensional histogram...
Yonghui Xiao, James J. Gardner, Li Xiong
SG
2007
Springer
14 years 3 months ago
Data-Embeddable Texture Synthesis
Abstract. Data hiding techniques onto images provide tools for protecting copyright or sending secret messages, and they are currently utilized as a simple input device of a cell p...
Hirofumi Otori, Shigeru Kuriyama
DAC
1999
ACM
14 years 10 months ago
Behavioral Synthesis Techniques for Intellectual Property Protection
? The economic viability of the reusable core-based design paradigm depends on the development of techniques for intellectual property protection. We introduce the first dynamic wa...
Inki Hong, Miodrag Potkonjak
WWW
2008
ACM
14 years 10 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...