In this paper our aim is to investigate the properties of the modulation domain and more specifically, to evaluate the relative contributions of the modulation magnitude and phas...
Kuldip K. Paliwal, Belinda Schwerin, Kamil K. W&oa...
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produ...
To allow for an efficient usage of a device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more comp...