Sciweavers

2259 search results - page 90 / 452
» Separation and information hiding
Sort
View
CORR
2007
Springer
149views Education» more  CORR 2007»
13 years 9 months ago
Very fast watermarking by reversible contrast mapping
—Reversible contrast mapping (RCM) is a simple integer transform that applies to pairs of pixels. For some pairs of pixels, RCM is invertible, even if the least significant bits...
Dinu Coltuc, Jean-Marc Chassery
JDCTA
2008
535views more  JDCTA 2008»
13 years 9 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
JSS
2000
83views more  JSS 2000»
13 years 8 months ago
Module interconnection features in object-oriented development tools
The black-box reuse of library classes in the construction of an object-oriented (OO) application is dicult: the principle of information hiding may be violated if classes must kn...
Sergio E. R. de Carvalho, Julio Cesar Sampaio do P...
INFOCOM
2010
IEEE
13 years 7 months ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant
MASS
2010
181views Communications» more  MASS 2010»
13 years 6 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer