Sciweavers

18374 search results - page 83 / 3675
» Applications for data hiding
Sort
View
ICIP
2006
IEEE
16 years 7 months ago
Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration
In this paper, we present a framework for the design of steganographic schemes that can provide provable security by achieving zero Kullback-Leibler divergence between the cover a...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
AADEBUG
1995
Springer
15 years 9 months ago
Software Testability Measurement for Assertion Placement and Fault Localization
Software testability, the tendency for software to reveal its faults during testing, is an important issue for veri cation and quality assurance. Testability measurement can also b...
Jeffrey M. Voas
CSREASAM
2006
15 years 6 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
PRIMA
2009
Springer
16 years 4 hour ago
Designing a Two-Sided Matching Protocol under Asymmetric Information
Abstract. We have developed a new two-sided matching protocol including job applicants and employers in the condition that applicants have conditional preferences and well informed...
Masanori Hatanaka, Shigeo Matsubara
ISMAR
2006
IEEE
15 years 11 months ago
Texture generation over the marker area
In this paper, we present a method for generating a texture for hiding a marker in augmented reality applications. The texture is generated by interpolating the neighbourhood of t...
Sanni Siltanen