Sciweavers

2259 search results - page 16 / 452
» Separation and information hiding
Sort
View
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 8 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
SSWMC
2004
13 years 8 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
ICIP
2004
IEEE
14 years 9 months ago
Estimating and undoing rotation for print-scan resilient data hiding
This paper proposes a method to hide information into images that achieves robustness against printing and scanning with blind decoding. A significant contribution of this paper i...
Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath,...
ICIP
2004
IEEE
14 years 9 months ago
Data hiding using trellis coded quantization
Information theoretic tools lead to the design and analysis of new blind data hiding methods. A novel quantizationbased blind method, which uses trellis coded quantization, is pro...
Ersin Esen, A. Aydin Alatan
TIFS
2008
152views more  TIFS 2008»
13 years 7 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...