Sciweavers

4029 search results - page 15 / 806
» Experience with Software Watermarking
Sort
View
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 3 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 3 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
SOFTWARE
2002
13 years 9 months ago
Experience in Implementing a Learning Software Organization
Kurt Schneider, Jan-Peter von Hunnius, Victor R. B...
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
14 years 2 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser
DICTA
2003
13 years 11 months ago
Image Error Concealment Based on Watermarking
Imperfect transmission of block-coded images often causes lost blocks. These blocks may contain very important information of image. In this paper a new error concealment scheme is...
Shinfeng D. Lin, Shih-Chieh Shie, Jie-Wei Chen