Sciweavers

2259 search results - page 86 / 452
» Separation and information hiding
Sort
View
TCC
2005
Springer
77views Cryptology» more  TCC 2005»
14 years 2 months ago
Upper and Lower Bounds on Black-Box Steganography
We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its entropy and the ability to sample from it. On the negati...
Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russ...
AIS
2004
Springer
14 years 2 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim
CAISE
2004
Springer
14 years 2 months ago
Method Components - Rationale Revealed
The configuration of systems engineering methods is a challenging task. As a method engineer it is essential to have conceptual constructs capable of reducing the burden of details...
Kai Wistrand, Fredrik Karlsson
ISCIS
2003
Springer
14 years 2 months ago
A Video Watermarking Algorithm Based on the Human Visual System Properties
Abstract. In this paper, we propose a new video watermarking algorithm based on the human visual system (HVS) properties to find effective locations in video sequences for robust ...
Ji-Young Moon, Yo-Sung Ho
AGP
2010
IEEE
14 years 2 months ago
Proof-Theoretic and Higher-Order Extensions of Logic Programming
We review the Italian contribution to proof-theoretic and higher-order extensions of logic programming; this originated from the realization that Horn clauses lacked standard abstr...
Alberto Momigliano, Mario Ornaghi