The development of watermarking schemes in the literature is generally guided by a power constraint on the watermark to be embedded into the host. In a steganographic framework the...
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
In this work, we propose a data embedding scheme in MPEG1/Audio Layer II compressed domain. Data embedding is conducted every AAU by using side information (location of sub-band a...
Our previous research shows that the use of multiple sources of information based on intrinsic AV features and external knowledge helps to detect events in soccer video. To make t...