Sciweavers

24529 search results - page 49 / 4906
» Computing on Authenticated Data
Sort
View
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 10 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
ICPP
2006
IEEE
14 years 4 months ago
hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems
The open feature of peer-to-peer systems invites the spread of the malfunctioning data. Additional reputation systems are constructed to guarantee the data authenticity. One chall...
Xiaomei Liu, Li Xiao
TCSV
2008
156views more  TCSV 2008»
13 years 9 months ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
ICMCS
2009
IEEE
134views Multimedia» more  ICMCS 2009»
13 years 7 months ago
Robust lossless data hiding based on block gravity center for selective authentication
Reversible or lossless data hiding enables host media to be restored from marked media without any loss of host information. However, since most of existing lossless data hiding m...
Kyung-Su Kim, Min-Jeong Lee, Young-Ho Suh, Heung-K...
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
14 years 3 months ago
Secure data hiding in binary document images for authentication
In this paper, we present a data hiding algorithm for binary document images. This algorithm is based on the DistanceReciprocal Distortion Measure [1] that is used to evaluate the...
Haiping Lu, Alex C. Kot, Jun Cheng