Sciweavers

17 search results - page 2 / 4
» Statistical Attack Resilient Data Hiding
Sort
View
FC
1999
Springer
97views Cryptology» more  FC 1999»
13 years 8 months ago
Playing "Hide and Seek" with Stored Keys
In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC. We describe efficie...
Adi Shamir, Nicko van Someren
ICASSP
2010
IEEE
13 years 2 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
ICIP
2005
IEEE
14 years 6 months ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
JSW
2008
97views more  JSW 2008»
13 years 4 months ago
Segmenting Histogram-based Robust Audio Watermarking Approach
Based on the invariant features and data distribution in time domain before and after attacking on the audio, it is clearly that the standard variance shows good invariant statisti...
Xiaoming Zhang
SASN
2004
ACM
13 years 9 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner