Among the many techniques available for informationconcealment, those based on spread spectrummodulationshave proven to yield improved results when robustness against attack is at...
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
A number of researchers have proposed using digital marks to provide ownership identification for intellectual property. Many of these techniques share three specific weaknesses: ...
John Lach, William H. Mangione-Smith, Miodrag Potk...
A digital movie can be created jointly under the cooperation of many creators. It is then necessary to provide protection to the creatorship of each participating creator. In this ...
Within the expanding paradigm of medical imaging and wireless communications there is increasing demand for transmitting diagnostic medical imagery over error-prone wireless commu...
Dominic Osborne, Derek Abbott, Matthew Sorell, Der...