This paper presents a composite blind digital watermarking technique, CompMark, to hide a visually meaningful grayscale logo in a host image. The multi-resolution fusion principle...
We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for ...
Bill G. Horne, Lesley R. Matheson, Casey Sheehan, ...
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Java programs distributed through Internet are now suffering from program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled...