Sciweavers

18374 search results - page 86 / 3675
» Applications for data hiding
Sort
View
CORR
2007
Springer
149views Education» more  CORR 2007»
15 years 5 months ago
Very fast watermarking by reversible contrast mapping
—Reversible contrast mapping (RCM) is a simple integer transform that applies to pairs of pixels. For some pairs of pixels, RCM is invertible, even if the least significant bits...
Dinu Coltuc, Jean-Marc Chassery
ACSAC
2010
IEEE
15 years 3 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
IPPS
2008
IEEE
15 years 12 months ago
Smart proxies in Java RMI with dynamic aspect-oriented programming
Java RMI extends Java with distributed objects whose methods can be called from remote clients. traction is supported using statically-generated proxy objects on the client to hid...
Andrew Stevenson, Steve MacDonald
ISPDC
2005
IEEE
15 years 11 months ago
Enforcing consistency during the adaptation of a parallel component
Abstract. Grid architectures are execution environments that are known to be at the same time distributed, parallel, heterogeneous and dynamic. While current tools focus solutions ...
Jérémy Buisson, Françoise And...
TES
2004
Springer
15 years 10 months ago
Robust Web Services via Interaction Contracts
Web services represent the latest effort of the information technology industry to provide a framework for cross enterprise automation. One principal characteristic of this framewo...
David B. Lomet