Sciweavers

3147 search results - page 4 / 630
» Statistically Hiding Sets
Sort
View
TCSV
2008
124views more  TCSV 2008»
13 years 7 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
14 years 1 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
TGC
2007
Springer
14 years 1 months ago
Formal Approaches to Information-Hiding (Tutorial)
Abstract. In this survey paper we consider the class of protocols for informationhiding which use randomization to obfuscate the link between the observables and the information to...
Romain Beauxis, Konstantinos Chatzikokolakis, Catu...
IJNSEC
2007
96views more  IJNSEC 2007»
13 years 7 months ago
Research on Data Hiding Capacity
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
Zhensong Liao, Yan Huang, Chisong Li
JOT
2006
185views more  JOT 2006»
13 years 7 months ago
Empirical Study of Object-Oriented Metrics
The increasing importance of software measurement has led to development of new software measures. Many metrics have been proposed related to various constructs like class, coupli...
K. K. Aggarwal, Yogesh Singh, Arvinder Kaur, Ruchi...