Sciweavers

17 search results - page 3 / 4
» Worst Case Attack on Quantization Based Data Hiding
Sort
View
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 3 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
ICIP
2001
IEEE
14 years 7 months ago
Minimum discrimination information clustering: modeling and quantization with Gauss mixtures
Gauss mixtures have gained popularity in statistics and statistical signal processing applications for a variety of reasons, including their ability to well approximatea large cla...
Robert M. Gray, John C. Young, Anuradha K. Aiyer
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
13 years 11 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
INFOCOM
2009
IEEE
14 years 19 days ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...
CCS
2007
ACM
14 years 5 days ago
Preserving privacy in gps traces via uncertainty-aware path cloaking
Motivated by a probe-vehicle based automotive traffic monitoring system, this paper considers the problem of guaranteed anonymity in a dataset of location traces while maintainin...
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabad...