Sciweavers

1045 search results - page 109 / 209
» On the Security of Digital Tachographs
Sort
View
ICMCS
2000
IEEE
145views Multimedia» more  ICMCS 2000»
14 years 1 months ago
Staganalysis of LSB Encoding in Color Images
In this paper, we analyze the security of Least Significant Bit (LSB) embedding for hiding messages in high-color-depth digital images. We introduce a powerful steganalytic techni...
Jiri Fridrich, Rui Du, Meng Long
MM
2000
ACM
112views Multimedia» more  MM 2000»
14 years 1 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
CIA
2000
Springer
14 years 1 months ago
A Social Mechanism of Reputation Management in Electronic Communities
Abstract. Trust is important wherever agents must interact. We consider the important case of interactions in electronic communities, where the agents assist and represent principa...
Bin Yu, Munindar P. Singh
ETS
2002
IEEE
144views Hardware» more  ETS 2002»
13 years 8 months ago
Creating Shared Knowledge: Instructional Knowledge Management Systems
Document management, information management, and knowledge management are three processes of an instructional knowledge management system (IKMS) that require different ways of thi...
Gerald S. Edmonds, Rob Pusch
SUTC
2010
IEEE
13 years 7 months ago
User-Based Attestation for Trustworthy Visual Sensor Networks
Abstract—Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems...
Thomas Winkler, Bernhard Rinner