Sciweavers

126 search results - page 1 / 26
» Information Theory and the Security of Binary Data Perturbat...
Sort
View
INDOCRYPT
2004
Springer
13 years 10 months ago
Information Theory and the Security of Binary Data Perturbation
Random data perturbation (RDP) has been in use for several years in statistical databases and public surveys as a means of providing privacy to individuals while collecting informa...
Poorvi L. Vora
SDM
2007
SIAM
130views Data Mining» more  SDM 2007»
13 years 6 months ago
Towards Attack-Resilient Geometric Data Perturbation
Data perturbation is a popular technique for privacypreserving data mining. The major challenge of data perturbation is balancing privacy protection and data quality, which are no...
Keke Chen, Gordon Sun, Ling Liu
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
13 years 10 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
CCS
2004
ACM
13 years 10 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
ICMCS
2005
IEEE
111views Multimedia» more  ICMCS 2005»
13 years 10 months ago
An audio spread-spectrum data hiding system with an informed embedding strategy adapted to a Wiener filtering based receiver
A particular application of audio data hiding systems and watermarking systems consists of using the audio signal as a transmission channel for binary information. The system shou...
Cléo Baras, Nicolas Moreau