Sciweavers

18374 search results - page 53 / 3675
» Applications for data hiding
Sort
View
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 9 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
14 years 4 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
ITIIS
2010
183views more  ITIIS 2010»
13 years 8 months ago
Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting
To be reversible as a data hiding method, the original content and hidden message should be completely recovered. One important objective of this approach is to achieve high embed...
Hee Joon Hwang, Hyoung Joong Kim, Vasiliy Sachnev,...
ERSHOV
2006
Springer
14 years 1 months ago
A Formal Model of Data Privacy
Information systems support data privacy by constraining user's access to public views and thereby hiding the non-public underlying data. The privacy problem is to prove that ...
Phiniki Stouppa, Thomas Studer
PICS
2000
13 years 11 months ago
Data Embedding Using Phase Dispersion
A method of data embedding based on the convolution of message data with a random phase carrier is presented. The theory behind this method is reviewed and it is shown that the te...
Chris Honsinger