Sciweavers

18374 search results - page 54 / 3675
» Applications for data hiding
Sort
View
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
14 years 2 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
CSE
2008
IEEE
13 years 9 months ago
Provenance: The Bridge Between Experiments and Data
to compile abstract experiment designs into enactable workflows that utilise the best available resources. The automation of this step and of the workflow enactment, hides the deta...
Simon Miles, Paul T. Groth, Ewa Deelman, Karan Vah...
SIGMOD
2006
ACM
156views Database» more  SIGMOD 2006»
14 years 9 months ago
MauveDB: supporting model-based user views in database systems
Real-world data -- especially when generated by distributed measurement infrastructures such as sensor networks -- tends to be incomplete, imprecise, and erroneous, making it impo...
Amol Deshpande, Samuel Madden
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
14 years 1 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel
CCS
2009
ACM
14 years 4 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...