Sciweavers

5752 search results - page 118 / 1151
» Informative Labeling Schemes
Sort
View
IWDW
2005
Springer
14 years 2 months ago
On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints
The development of watermarking schemes in the literature is generally guided by a power constraint on the watermark to be embedded into the host. In a steganographic framework the...
Mark T. Hogan, Félix Balado, Neil J. Hurley...
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
14 years 2 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
CSREASAM
2010
13 years 7 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
ICMCS
2006
IEEE
144views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Data Embedding in MPEG-1/Audio Layer II Compressed Domain using Side Information
In this work, we propose a data embedding scheme in MPEG1/Audio Layer II compressed domain. Data embedding is conducted every AAU by using side information (location of sub-band a...
Akihiro Matsuoka, Kiyoshi Tanaka, Akio Yoneyama, Y...
ICMCS
2005
IEEE
94views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Fusion of Multiple Asynchronous Information Sources for Event Detection in Soccer Video
Our previous research shows that the use of multiple sources of information based on intrinsic AV features and external knowledge helps to detect events in soccer video. To make t...
Huaxin Xu, Tat-Hoe Fong, Tat-Seng Chua