Sciweavers

113 search results - page 1 / 23
» Computing the Leakage of Information-Hiding Systems
Sort
View
TACAS
2010
Springer
162views Algorithms» more  TACAS 2010»
13 years 11 months ago
Computing the Leakage of Information-Hiding Systems
We address the problem of computing the information leakage of a system in an efficient way. We propose two methods: one based on reducing the problem to reachability, and the oth...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
SAC
2010
ACM
12 years 11 months ago
Improving complex distributed software system availability through information hiding
Li Wang, Yair Leiferman, Shangping Ren, Kevin A. K...
DAC
2009
ACM
13 years 11 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 4 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
ICASSP
2010
IEEE
13 years 2 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...