Sciweavers

18374 search results - page 68 / 3675
» Applications for data hiding
Sort
View
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 3 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
COCO
2010
Springer
168views Algorithms» more  COCO 2010»
13 years 10 months ago
A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP
We investigate the question of what languages can be decided efficiently with the help of a recursive collisionfinding oracle. Such an oracle can be used to break collisionresistan...
Iftach Haitner, Mohammad Mahmoody, David Xiao
DCOSS
2006
Springer
14 years 1 months ago
The Virtual Pheromone Communication Primitive
We propose a generic communication primitive designed for sensor networks. Our primitive hides details of network communication while retaining sufficient programmer control over t...
Leo Szumel, John D. Owens
ISORC
2003
IEEE
14 years 3 months ago
Object-Oriented Middleware Infrastructure for Distributed Augmented Reality
The paper describes design and implementation of software infrastructure for building augmented reality applications for ubiquitous computing environments. Augmented reality is on...
Eiji Tokunaga, Andrej van der Zee, Makoto Kurahash...
DAC
2004
ACM
14 years 10 months ago
Virtual memory window for application-specific reconfigurable coprocessors
Reconfigurable Systems-on-Chip (SoCs) on the market consist of full-fledged processors and large Field-Programmable Gate-Arrays (FPGAs). The latter can be used to implement the sy...
Miljan Vuletic, Laura Pozzi, Paolo Ienne