Sciweavers

IH
2001
Springer
13 years 10 months ago
F5-A Steganographic Algorithm
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. T...
Andreas Westfeld
IH
2001
Springer
13 years 10 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
IH
2001
Springer
13 years 10 months ago
Intellectual Property Metering
Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts a...
Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak
IH
2001
Springer
13 years 10 months ago
Second Generation Benchmarking and Application Oriented Evaluation
Shelby Pereira, Sviatoslav Voloshynovskiy, Maribel...
IH
2001
Springer
13 years 10 months ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar
Information Technology
Top of PageReset Settings