Sciweavers

18374 search results - page 25 / 3675
» Applications for data hiding
Sort
View
98
Voted
ICIAR
2007
Springer
15 years 3 months ago
Reversible Data Hiding for JPEG Images Based on Histogram Pairs
Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Peiqi Chai,...
74
Voted
DI
2006
54views more  DI 2006»
15 years 1 months ago
Data hiding in the NTFS file system
Ewa Huebner, Derek Bem, Cheong Kai Wee
53
Voted
CACM
2007
56views more  CACM 2007»
15 years 1 months ago
Hiding data, forensics, and anti-forensics
Hal Berghel
121
Voted
IJNSEC
2007
193views more  IJNSEC 2007»
15 years 1 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
166
Voted
TIFS
2008
133views more  TIFS 2008»
15 years 1 months ago
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
Abstract-- It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensu...
François Cayre, Patrick Bas