Sciweavers

123 search results - page 18 / 25
» Semantic Encryption Transformation Scheme
Sort
View
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
USENIX
2001
13 years 9 months ago
User-Level Extensibility in the Mona File System
A conventional file system provides the user with generic structure and semantics for accessing files. The default scheme is sufficient for many applications. However, many applic...
Paul W. Schermerhorn, Robert J. Minerick, Peter W....
ICIP
2005
IEEE
14 years 9 months ago
An adaptive DCT-based Mod-4 steganographic method
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...
Xiaojun Qi, KokSheik Wong
TC
2010
13 years 6 months ago
Authenticated Group Key Transfer Protocol Based on Secret Sharing
—Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most ofte...
Lein Harn, Changlu Lin
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 1 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...