This paper presents a concept for the integration of quantitative and qualitative information sources with their accompanying management support functionalities from navigation and...
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
Side channel attacks are a major security concern for smart cards and other embedded devices. They analyze the variations on the power consumption to find the secret key of the en...
1 Classical systems using hierarchical modulation (such as DVB-SH) involve a "high-priority" (HP) and a "lowpriority" (LP) bit stream that are separately and in...