Sciweavers

1156 search results - page 3 / 232
» Compositional Methods for Information-Hiding
Sort
View
APSEC
2008
IEEE
14 years 3 days ago
Management of Composites in Software Engineering Environments
Design and development scalability, in any engineering, requires information hiding and a specific composition mechanism in which composite items are made-up of other items. This ...
Jacky Estublier, Germán Vega, Thomas Levequ...
MMSEC
2004
ACM
109views Multimedia» more  MMSEC 2004»
13 years 11 months ago
Statistical characterisation of MP3 encoders for steganalysis
This paper outlines a strategy to discriminate different ISO/ MPEG 1 Audio Layer-3 (MP3) encoding programs by statistical particularities of the compressed audio streams. We use ...
Rainer Böhme, Andreas Westfeld
DEXAW
1999
IEEE
102views Database» more  DEXAW 1999»
13 years 10 months ago
NIGELOG: Protecting Logging Information by Hiding Multiple Backups in Directories
This paper proposed a novel method to protect logging information more securely. The method, named NIGELOG, produces multiple backups of the logging information, hides them in arb...
Tetsuji Takada, Hideki Koike
BMCBI
2008
71views more  BMCBI 2008»
13 years 5 months ago
An improved string composition method for sequence comparison
Background: Historically, two categories of computational algorithms (alignment-based and alignment-free) have been applied to sequence comparison
Guoqing Lu, Shunpu Zhang, Xiang Fang
ICIP
2002
IEEE
14 years 7 months ago
Perceptual watermarking of non i.i.d. signals based on wide spread spectrum using side information
The theoretical foundations of data hiding have been revealed by formulating the problem as message communication over a noisy channel, i.e. the host document. In light of this de...
Christine Guillemot, Gaëtan Le Guelvouit, St&...