Separation logic involves two dual forms of modularity: local reasoning makes part of the store invisible within a static scope, whereas hiding local state makes part of the store...
Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provide...
A particular application of audio data hiding systems and watermarking systems consists of using the audio signal as a transmission channel for binary information. The system shou...
An adaptive spread spectrum synchronous scalable(A4S) data hiding strategy is being put forward to integrate the disparate 3D facial visualization data, into a single JPEG2000 for...
Halftone image watermarking techniques that allow automated extraction of the embedded watermark data are useful in a variety of document security and workflow applications. The p...