Sciweavers

909 search results - page 30 / 182
» Reversible data hiding
Sort
View
ICPR
2002
IEEE
14 years 11 months ago
Hiding a Face in a Fingerprint Image
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. We present...
Anil K. Jain, Umut Uludag, Rein-Lien Hsu
COMAD
2008
13 years 11 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
ASPLOS
2004
ACM
14 years 3 months ago
HIDE: an infrastructure for efficiently protecting information leakage on the address bus
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Xiaotong Zhuang, Tao Zhang, Santosh Pande

Publication
260views
12 years 9 months ago
Alternative Astronomical FITS Imaging
Some important information on images of radio sources, such as radio flux and the noise of the map, is not easily accessible by astronomers other than radio astronomers, unless the...
E.E. Varsaki, N.A.B. Gizani, V. Fotopoulos and A.N...
IH
2004
Springer
14 years 3 months ago
Information Hiding in Finite State Machine
In this paper, we consider how to hide information into finite state machine (FSM), one of the popular computation models. The key advantage of hiding information in FSM is that t...
Lin Yuan, Gang Qu