Sciweavers

47 search results - page 3 / 10
» A Novel Approach to Hide Credentials
Sort
View
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
13 years 11 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
ESORICS
2009
Springer
13 years 11 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
COMAD
2008
13 years 6 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
JMM2
2008
103views more  JMM2 2008»
13 years 4 months ago
A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing
To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a novel steganographic approach using tri-way pixel-value dif...
Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, Te...
NORDSEC
2009
Springer
13 years 11 months ago
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communications into hard to trace paths, composed of several middleman nodes, towards hiding communicat...
Igor Margasinski