Sciweavers

210 search results - page 6 / 42
» Research on Data Hiding Capacity
Sort
View
IJNSEC
2007
193views more  IJNSEC 2007»
13 years 9 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
CISS
2007
IEEE
14 years 4 months ago
Towards Optimal Design of Data Hiding Algorithms Against Nonparametric Adversary Models
Abstract—This paper presents a novel zero-sum watermarking game between a detection algorithm and a data hiding adversary. Contrary to previous research, the detection algorithm ...
Alvaro A. Cárdenas, George V. Moustakides, ...
ICAC
2008
IEEE
14 years 4 months ago
1000 Islands: Integrated Capacity and Workload Management for the Next Generation Data Center
Recent advances in hardware and software virtualization offer unprecedented management capabilities for the mapping of virtual resources to physical resources. It is highly desira...
Xiaoyun Zhu, Donald Young, Brian J. Watson, Zhikui...
TOPLAS
2002
98views more  TOPLAS 2002»
13 years 9 months ago
Data abstraction and information hiding
traction and information hiding K. RUSTAN M. LEINO and GREG NELSON Compaq Systems Research Center er describes an approach for verifying programs in the presence of data abstractio...
K. Rustan M. Leino, Greg Nelson
EDBT
2009
ACM
128views Database» more  EDBT 2009»
14 years 1 months ago
HIDE: heterogeneous information DE-identification
While there is an increasing need to share data that may contain personal information, such data sharing must preserve individual privacy without disclosing any identifiable infor...
James J. Gardner, Li Xiong, Kanwei Li, James J. Lu