Sciweavers

1143 search results - page 34 / 229
» Extraction in software watermarking
Sort
View
JOT
2010
122views more  JOT 2010»
13 years 6 months ago
Extracting State Models for Black-Box Software Components
Rajiv Ranjan Suman, Rajib Mall, Srihari Sukumaran,...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Bandera: extracting finite-state models from Java source code
James C. Corbett, Matthew B. Dwyer, John Hatcliff,...
ICIP
2008
IEEE
14 years 2 months ago
On the security of non-forgeable robust hash functions
In many applications, it is often desirable to extract a consistent key from a multimedia object (e.g., an image), even when the object has gone through a noisy channel. For examp...
Qiming Li, Sujoy Roy
ICIP
2004
IEEE
14 years 9 months ago
Robust perceptual image hashing via matrix invariants
In this paper we suggest viewing images (as well as attacks on them) as a sequence of linear operators and propose novel hashing algorithms employing transforms that are based on ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
EMSOFT
2004
Springer
14 years 1 months ago
Reducing program image size by extracting frozen code and data
Daniel Citron, Gadi Haber, Roy Levin