Sciweavers

977 search results - page 44 / 196
» Secret image sharing
Sort
View
IH
2007
Springer
15 years 10 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
61
Voted
IEICET
2008
87views more  IEICET 2008»
15 years 4 months ago
An Image Completion Algorithm Using Occlusion-Free Images from Internet Photo Sharing Sites
Hanieh Amirshahi, Satoshi Kondo, Koichi Ito, Takaf...
TDSC
2010
218views more  TDSC 2010»
15 years 2 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
MOBIHOC
2009
ACM
16 years 4 months ago
Efficient uncoordinated FHSS anti-jamming communication
We address the problem of jamming-resistant communication in scenarios in which the communicating parties do not share secret keys. This includes scenarios where the communicating...
Mario Strasser, Christina Pöpper, Srdjan Capk...
136
Voted
ASPLOS
2006
ACM
15 years 10 months ago
SecCMP: a secure chip-multiprocessor architecture
Security has been considered as an important issue in processor design. Most of the existing mechanisms address security and integrity issues caused by untrusted main memory in si...
Li Yang, Lu Peng