Sciweavers

134 search results - page 15 / 27
» Data hiding using trellis coded quantization
Sort
View
SAC
2005
ACM
14 years 29 days ago
Time-varying, multivariate volume data reduction
Large-scale supercomputing is revolutionizing the way science is conducted. A growing challenge, however, is understanding the massive quantities of data produced by largescale si...
Nathaniel Fout, Kwan-Liu Ma, James P. Ahrens
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 7 months ago
A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing ...
Jau-Ji Shen, Po-Wei Hsu
DCC
2009
IEEE
14 years 8 months ago
Optimization of Correlated Source Coding for Event-Based Monitoring in Sensor Networks
Motivated by the paradigm of event-based monitoring, which can potentially alleviate the inherent bandwidth and energy constraints associated with wireless sensor networks, we con...
Jaspreet Singh, Ankur Saxena, Kenneth Rose, Upaman...
EMNLP
2010
13 years 5 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark
IH
2007
Springer
14 years 1 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath