Sciweavers

909 search results - page 63 / 182
» Reversible data hiding
Sort
View
TIFS
2008
159views more  TIFS 2008»
13 years 10 months ago
Chaotic-Type Features for Speech Steganalysis
We investigate the use of chaotic-type features for recorded speech steganalysis. Considering that data hiding within a speech signal distorts the chaotic properties of the origina...
Osman Hilmi Kocal, Emrah Yürüklü, I...
PODS
2008
ACM
155views Database» more  PODS 2008»
14 years 10 months ago
The recovery of a schema mapping: bringing exchanged data back
A schema mapping is a specification that describes how data from a source schema is to be mapped to a target schema. Once the data has been transferred from the source to the targ...
Marcelo Arenas, Jorge Pérez, Cristian River...
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
14 years 4 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
IV
2005
IEEE
183views Visualization» more  IV 2005»
14 years 3 months ago
3D Information Visualization for Time Dependent Data on Maps
The visual analysis of time dependent data is an essential task in many application fields. However, visualizing large time dependent data collected within a spatial context is st...
Christian Tominski, Petra Schulze-Wollgast, Heidru...
DEXA
2005
Springer
93views Database» more  DEXA 2005»
14 years 3 months ago
Provable Data Privacy
In relational database systems a combination of privileges and views is employed to limit a user’s access and to hide non-public data. The data privacy problem is to decide wheth...
Kilian Stoffel, Thomas Studer