Sciweavers

2827 search results - page 27 / 566
» Data Hiding in Video
Sort
View
COMAD
2008
13 years 10 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
FC
1999
Springer
97views Cryptology» more  FC 1999»
14 years 27 days ago
Playing "Hide and Seek" with Stored Keys
In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC. We describe efficie...
Adi Shamir, Nicko van Someren
ISSS
1999
IEEE
89views Hardware» more  ISSS 1999»
14 years 28 days ago
Loop Scheduling and Partitions for Hiding Memory Latencies
Partition Scheduling with Prefetching (PSP) is a memory latency hiding technique which combines the loop pipelining technique with data prefetching. In PSP, the iteration space is...
Fei Chen, Edwin Hsing-Mean Sha
ICIP
2008
IEEE
14 years 10 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
NPIV
1999
ACM
141views Visualization» more  NPIV 1999»
14 years 29 days ago
Interactive Video Cubism
This paper presents an interactive video visualization technique called video cubism. With this technique, video data is considered to be a block of three dimensional data where f...
Sidney Fels, Kenji Mase