Sciweavers

5766 search results - page 158 / 1154
» Reverse Engineering of Data
Sort
View
SEMWEB
2001
Springer
15 years 9 months ago
On the Integration of Topic Maps and RDF data
Abstract. Topic Maps and RDF are two independently developed paradigms and standards for the representation, interchange, and exploitation of model-based data on the web. Each para...
Martin S. Lacher, Stefan Decker
137
Voted
IH
2005
Springer
15 years 10 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
CBSE
2006
Springer
15 years 6 months ago
Using a Lightweight Workflow Engine in a Plugin-Based Product Line Architecture
This paper presents a software product line architecture where applications are assembled by installing a set of plugins on a common software base. In this architecture, the softwa...
Humberto Cervantes, Sonia Charleston-Villalobos
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
15 years 11 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran
JIPS
2010
273views more  JIPS 2010»
14 years 11 months ago
Hiding Secret Data in an Image Using Codeword Imitation
This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to...
Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai