Sciweavers

909 search results - page 58 / 182
» Reversible data hiding
Sort
View
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
14 years 4 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
IWDW
2004
Springer
14 years 3 months ago
Fingerprinting Curves
This paper presents a new method for robust data hiding in curves and highlights potential applications including digital fingerprinting of map document for trace and track purpos...
Hongmei Gou, Min Wu
ERSHOV
2006
Springer
14 years 1 months ago
A Formal Model of Data Privacy
Information systems support data privacy by constraining user's access to public views and thereby hiding the non-public underlying data. The privacy problem is to prove that ...
Phiniki Stouppa, Thomas Studer
PICS
2000
13 years 11 months ago
Data Embedding Using Phase Dispersion
A method of data embedding based on the convolution of message data with a random phase carrier is presented. The theory behind this method is reviewed and it is shown that the te...
Chris Honsinger
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
14 years 2 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen