Sciweavers

977 search results - page 96 / 196
» Secret image sharing
Sort
View
104
Voted
MM
2010
ACM
163views Multimedia» more  MM 2010»
15 years 3 months ago
Multi-exposure imaging on mobile devices
Many natural scenes have a dynamic range that is larger than the dynamic range of a camera's image sensor. A popular approach to producing an image without under- and over-ex...
Natasha Gelfand, Andrew Adams, Sung Hee Park, Kari...
99
Voted
ICIP
2006
IEEE
16 years 5 months ago
Determining Achievable Rates for Secure, Zero Divergence, Steganography
In steganography (the hiding of data into innocuous covers for secret communication) it is difficult to estimate how much data can be hidden while still remaining undetectable. To...
Kenneth Sullivan, Kaushal Solanki, B. S. Manjunath...
142
Voted
ICC
2009
IEEE
174views Communications» more  ICC 2009»
15 years 10 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
129
Voted
ICIAR
2005
Springer
15 years 9 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
133
Voted
IJNSEC
2007
194views more  IJNSEC 2007»
15 years 3 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...