Sciweavers

143 search results - page 14 / 29
» Language-Based Information Erasure
Sort
View
IH
2007
Springer
14 years 2 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
INFOSCALE
2006
ACM
14 years 2 months ago
Adaptive content management in structured P2P communities
A fundamental paradigm in P2P is that of a large community of intermittently-connected nodes that cooperate to share files. Because nodes are intermittently connected, the P2P co...
Jussi Kangasharju, Keith W. Ross, David A. Turner
MIPS
2004
Springer
121views Multimedia» more  MIPS 2004»
14 years 1 months ago
Analysis of FEC Codes for Partially Reliable Media Broadcasting Schemes
With many multimedia delivery schemes a client does not necessarily receive a given media content entirely (e.g. router congestions can lead some information to be lost). Mechanism...
Christoph Neumann, Vincent Roca
TIT
1998
70views more  TIT 1998»
13 years 8 months ago
Reduced-Redundancy Product Codes for Burst Error Correction
In a typical burst-error correction application of a product code of nv nh arrays, one uses an [nh; nh rh] code Ch that detects corrupted rows, and an [nv; nv rv] code Cv that is...
Ron M. Roth, Gadiel Seroussi
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
13 years 8 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...