We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
The open feature of peer-to-peer systems invites the spread of the malfunctioning data. Additional reputation systems are constructed to guarantee the data authenticity. One chall...
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
Reversible or lossless data hiding enables host media to be restored from marked media without any loss of host information. However, since most of existing lossless data hiding m...
Kyung-Su Kim, Min-Jeong Lee, Young-Ho Suh, Heung-K...
In this paper, we present a data hiding algorithm for binary document images. This algorithm is based on the DistanceReciprocal Distortion Measure [1] that is used to evaluate the...