Sciweavers

602 search results - page 57 / 121
» Auctioning transformable goods
Sort
View
JMM2
2008
228views more  JMM2 2008»
14 years 11 months ago
Adaptive AC-Coefficient Prediction for Image Compression and Blind Watermarking
In this work, an adaptive image compression algorithm is proposed based on the prediction of AC coefficients in Discrete Cosine Transform (DCT) block during reconstruction of image...
Kilari Veera Swamy, S. Srinivas Kumar
JEI
2006
113views more  JEI 2006»
14 years 11 months ago
Transparent robust information hiding for ownership verification
For copyright protection, the robustness of a watermarking scheme against various attacks is an essential requirement. Many proposed robust watermarking schemes may achieve good r...
Dan Yu, Farook Sattar, Sirajudeen Gulam Razul
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
15 years 5 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
91
Voted
ICSE
2009
IEEE-ACM
15 years 12 months ago
Refactoring sequential Java code for concurrency via concurrent libraries
Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 package java.util.concurrent (j.u.c.) supports writing concurrent programs: much of...
Danny Dig, John Marrero, Michael D. Ernst
ACISP
2005
Springer
15 years 4 months ago
Cancelable Key-Based Fingerprint Templates
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
Russell Ang, Reihaneh Safavi-Naini, Luke McAven