Sciweavers

909 search results - page 59 / 182
» Reversible data hiding
Sort
View
CSE
2008
IEEE
13 years 10 months ago
Provenance: The Bridge Between Experiments and Data
to compile abstract experiment designs into enactable workflows that utilise the best available resources. The automation of this step and of the workflow enactment, hides the deta...
Simon Miles, Paul T. Groth, Ewa Deelman, Karan Vah...
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
14 years 1 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel
ICIP
1999
IEEE
14 years 11 months ago
Data Embedding in Text for a Copier System
In this paper, we present a scheme for embedding data in copies (color or monochrome) of predominantly text pages that may also contain color images or graphics. Embedding data im...
Anoop K. Bhattacharjya, Hakan Ancin
CCS
2009
ACM
14 years 5 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
BMCBI
2005
178views more  BMCBI 2005»
13 years 10 months ago
A quantization method based on threshold optimization for microarray short time series
Background: Reconstructing regulatory networks from gene expression profiles is a challenging problem of functional genomics. In microarray studies the number of samples is often ...
Barbara Di Camillo, Fatima Sanchez-Cabo, Gianna To...