Sciweavers

2340 search results - page 8 / 468
» Data abstraction and information hiding
Sort
View
CSCW
2004
ACM
14 years 28 days ago
Collaborative modeling: hiding UML and promoting data examples in NEMo
Domain experts are essential for successful software development, but these experts may not recognize their ideas when abstracted into Unified Modeling Language (UML) or ontologie...
Patricia K. Schank, Lawrence Hamel
SSWMC
2004
13 years 8 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
ICIP
2004
IEEE
14 years 9 months ago
Estimating and undoing rotation for print-scan resilient data hiding
This paper proposes a method to hide information into images that achieves robustness against printing and scanning with blind decoding. A significant contribution of this paper i...
Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath,...
TIFS
2008
152views more  TIFS 2008»
13 years 7 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
ICIP
2004
IEEE
14 years 9 months ago
Data hiding using trellis coded quantization
Information theoretic tools lead to the design and analysis of new blind data hiding methods. A novel quantizationbased blind method, which uses trellis coded quantization, is pro...
Ersin Esen, A. Aydin Alatan