Sciweavers

2259 search results - page 22 / 452
» Separation and information hiding
Sort
View
GRC
2008
IEEE
13 years 8 months ago
Towards Real-time Performance of Data Value Hiding for Frequent Data Updates
Hiding data values in privacy-preserving data mining (PPDM) protects information against unauthorized attacks while maintaining analytical data properties. The most popular models...
Jie Wang, Justin Zhan, Jun Zhang
TCSV
2008
124views more  TCSV 2008»
13 years 7 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang
ICIP
1999
IEEE
14 years 9 months ago
Data Hiding in Video
We propose a video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. The proposed method enables high rate of da...
Jong Jin Chae, B. S. Manjunath
ICPR
2002
IEEE
14 years 8 months ago
Hiding a Face in a Fingerprint Image
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. We present...
Anil K. Jain, Umut Uludag, Rein-Lien Hsu
HICSS
2010
IEEE
180views Biometrics» more  HICSS 2010»
14 years 2 months ago
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While m...
Craig A. Shue, Minaxi Gupta