Sciweavers

375 search results - page 59 / 75
» On the security of an image encryption method
Sort
View
ESORICS
2004
Springer
14 years 24 days ago
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
Abstract. The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first propos...
Rainer Böhme, Andreas Westfeld
IPCV
2007
13 years 8 months ago
QIM-Based Histogram-Preserving and High Capacity Steganography for JPEG Images
- We propose a secure steganographic approach with a high capacity. We first use small neighborhoods of the original histogram to calculate the minimum remapping from a histogram t...
Xiaojun Qi, Daniel Lewis
CCS
2008
ACM
13 years 9 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
JDFP
2006
139views more  JDFP 2006»
13 years 7 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
ICIP
1994
IEEE
14 years 8 months ago
A Digital Watermark
This paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capa...
Ron G. van Schyndel, Andrew Z. Tirkel, C. F. Osbor...