Sciweavers

159 search results - page 3 / 32
» Informed Recognition in Software Watermarking
Sort
View
COMPSAC
2002
IEEE
13 years 10 months ago
Rights Protection for Digital Contents Redistribution Over the Internet
Although Customer-to-Customer (C2C) business model has been around for years, second-hand markets of digital contents over the Internet are unpopular. A key factor to the success ...
Shing-Chi Cheung, Hanif Curreem
MIS
1999
Springer
111views Multimedia» more  MIS 1999»
13 years 10 months ago
On Fingerprinting Images for Recognition
A central task in multimedia systems is image management (storage and retrieval). As information is disseminated across vast networks, such as the Internet, methods of locating au...
Neil F. Johnson, Zoran Duric, Sushil Jajodia
IH
2005
Springer
13 years 11 months ago
Self-validating Branch-Based Software Watermarking
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, ...
Ginger Myles, Hongxia Jin
TASLP
2010
177views more  TASLP 2010»
13 years 15 days ago
A Watermarking-Based Method for Informed Source Separation of Audio Signals With a Single Sensor
In this paper, the issue of audio source separation from a single channel is addressed, i.e. the estimation of several source signals from a single observation of their mixture. Th...
Mathieu Parvaix, Laurent Girin, Jean-Marc Brossier
IEEEIA
2009
13 years 3 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...