It is a well known fact that encryption schemes cannot hide a plaintext length when it is unbounded. We thus admit that an approximation of it may leak and we focus on hiding its p...
In this paper, we propose a new method for hiding a signature image in the host image. We encode the signature image by a balanced two-description subband coder and embed the descr...
In this paper, we develop a robust image data hiding scheme based on multiple description coding of the signature image. At the transmitter, the signature image is encoded by balan...
In profiling, a tradeoff exists between information and overhead. For example, hardware-sampling profilers incur negligible overhead, but the information they collect is consequen...
Tipp Moseley, Alex Shye, Vijay Janapa Reddi, Dirk ...
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...