Sciweavers

168 search results - page 18 / 34
» Statistics and Secret Leakage
Sort
View
JSAC
2006
155views more  JSAC 2006»
13 years 7 months ago
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links
Network mobility introduces far more complexity than host mobility. Therefore, host mobility protocols such as Mobile IPv6 (MIPv6) need to be extended to support this new type of m...
Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shya...
ICMCS
2000
IEEE
145views Multimedia» more  ICMCS 2000»
13 years 12 months ago
Staganalysis of LSB Encoding in Color Images
In this paper, we analyze the security of Least Significant Bit (LSB) embedding for hiding messages in high-color-depth digital images. We introduce a powerful steganalytic techni...
Jiri Fridrich, Rui Du, Meng Long
IH
1999
Springer
13 years 11 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel
CIS
2006
Springer
13 years 11 months ago
An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection
In this paper, we propose an efficient watermarking technique using adaptive differential energy watermarking (ADEW) and cross binding wavelet tree (CBWT) for copyright protection....
Goo-Rak Kwon, Seung-Won Jung, Sung-Jea Ko
FC
1999
Springer
97views Cryptology» more  FC 1999»
13 years 11 months ago
Playing "Hide and Seek" with Stored Keys
In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC. We describe efficie...
Adi Shamir, Nicko van Someren