Sciweavers

536 search results - page 39 / 108
» Embedding Information Security into the Organization
Sort
View
MM
2004
ACM
195views Multimedia» more  MM 2004»
14 years 1 months ago
Hierarchical clustering of WWW image search results using visual, textual and link information
We consider the problem of clustering Web image search results. Generally, the image search results returned by an image search engine contain multiple topics. Organizing the resu...
Deng Cai, Xiaofei He, Zhiwei Li, Wei-Ying Ma, Ji-R...
ICDM
2010
IEEE
205views Data Mining» more  ICDM 2010»
13 years 6 months ago
Knowledge File System -- A Principled Approach to Personal Information Management
The Knowledge File System (KFS) is a smart virtual file system that sits between the operating system and the file system. Its primary functionality is to automatically organize fi...
Kuiyu Chang, I. Wayan Tresna Perdana, Bramandia Ra...
DRM
2003
Springer
14 years 1 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
ICIP
2004
IEEE
14 years 9 months ago
A blind cdma image watermarking scheme in wavelet domain
The paper proposes a blind spread spectrum watermarking scheme where watermark information is embedded redundantly in the multilevel wavelet coefficients of the cover image. It ha...
Santi P. Maity, Malay Kumar Kundu
JDCTA
2008
535views more  JDCTA 2008»
13 years 8 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...