Sciweavers

8 search results - page 2 / 2
» JPEG Steganography: A Performance Evaluation of Quantization...
Sort
View
ICIP
2001
IEEE
14 years 6 months ago
Hierarchical watermarking depending on local constraints
In this paper we propose a new watermarking technique where the watermark is embedded according to two keys. The first key is used to embed a code bit in a block of pixels. The se...
Christopher D. Coltman, Adrian G. Bors
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 2 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
SIGMOD
2007
ACM
179views Database» more  SIGMOD 2007»
14 years 5 months ago
How to barter bits for chronons: compression and bandwidth trade offs for database scans
Two trends are converging to make the CPU cost of a table scan a more important component of database performance. First, table scans are becoming a larger fraction of the query p...
Allison L. Holloway, Vijayshankar Raman, Garret Sw...