Sciweavers

246 search results - page 8 / 50
» Informed secure watermarking using optimal transport
Sort
View
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 8 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
14 years 1 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
IEEEIAS
2007
IEEE
14 years 2 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei
PIMRC
2008
IEEE
14 years 2 months ago
IEEE 802.21 transport solution using cross-layer optimized Stream Control Transmission Protocol
Abstract—The Media Independent Handover (MIH) architecture is designed to facilitate the signaling and enable seamless handovers in heterogeneous networks. In this paper, we prop...
Richard Rouil, Nada Golmie, Nicolas Montavont
IEEEIA
2009
13 years 5 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...