Sciweavers

83 search results - page 2 / 17
» Robust Encryption
Sort
View
ICMCS
2010
IEEE
260views Multimedia» more  ICMCS 2010»
13 years 3 months ago
Compressed-encrypted domain JPEG2000 image watermarking
In digital rights management (DRM) systems, digital media is often distributed by multiple levels of distributors in a compressed and encrypted format. The distributors in the cha...
A. V. Subramanyam, Sabu Emmanuel, Mohan S. Kankanh...
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
14 years 5 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
IVC
2006
156views more  IVC 2006»
13 years 5 months ago
Image encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques.Inthis communication,weproposea ...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud
ICASSP
2010
IEEE
13 years 5 months ago
Tracking encrypted VoIP calls via robust hashing of network flows
In this work we propose a Voice over IP (VoIP) call tracking scheme based on robust hashing of VoIP flows. In the proposed scheme the audio content of a possibly encrypted VoIP ď...
Baris Coskun, Nasir D. Memon
CCS
2003
ACM
13 years 10 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves