Sciweavers

3451 search results - page 136 / 691
» Collaborative attack modeling
Sort
View
USS
2010
15 years 11 days ago
Acoustic Side-Channel Attacks on Printers
We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dotmatrix printer processing English text is printing based on a record o...
Michael Backes, Markus Dürmuth, Sebastian Ger...
182
Voted
DSN
2011
IEEE
14 years 2 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
104
Voted
ICIP
2000
IEEE
16 years 4 months ago
An Information-Theoretic Model for Image Watermarking and Data Hiding
An information?theoretic model for image watermarking and data hiding systems is presented in this paper. The fundamental capacity limits of these systems are determined by the st...
Gen-Iu. Lin, Mehmet Kivanç Mihçak, P...
SIAMAM
2008
75views more  SIAMAM 2008»
15 years 2 months ago
Models of Virulent Phage Growth with Application to Phage Therapy
We modify existing models of bacteriophage growth on an exponentially growing bacterial population by including (1) density dependent phage attack rates and (2) loss to phage due ...
Hal L. Smith
122
Voted
ICIP
2004
IEEE
16 years 4 months ago
Estimation of attacker's scale and noise variance for qim-dc watermark embedding
Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore, the scaling factor needs to be estimated at the decoder side, such that the received (attac...
Reginald L. Lagendijk, Ivo D. Shterev