Sciweavers

113 search results - page 8 / 23
» Key Independent Watermark Detection
Sort
View
IWDW
2005
Springer
14 years 29 days ago
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes...
Patrick Bas, Jarmo Hurri
ICDE
2009
IEEE
690views Database» more  ICDE 2009»
14 years 2 months ago
A Model for Data Leakage Detection
— We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
TKDE
2011
182views more  TKDE 2011»
13 years 2 months ago
Data Leakage Detection
—We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
EVENT
2001
202views more  EVENT 2001»
13 years 8 months ago
Detecting Independently Moving Objects and Their Interactions in Georeferenced Airborne Video
In airborne video, objects are tracked from a moving camera and often imaged at very low resolution. The camera movement makes it difficult to determine whether or not an object i...
J. Brian Burns
CCS
2001
ACM
13 years 12 months ago
New Iterative Geometric Methods for Robust Perceptual Image Hashing
We propose a novel and robust hashing paradigm that uses iterative geometric techniques and relies on observations that main geometric features within an image would approximately ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...