Sciweavers

2827 search results - page 109 / 566
» Data Hiding in Video
Sort
View
BIOID
2008
101views Biometrics» more  BIOID 2008»
14 years 12 months ago
Template Protection for On-Line Signature-Based Recognition Systems
Abstract. Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two dif...
Emanuele Maiorana, Patrizio Campisi, Alessandro Ne...
JDCTA
2008
535views more  JDCTA 2008»
14 years 10 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
NAACL
2010
14 years 7 months ago
Linguistic Steganography Using Automatically Generated Paraphrases
This paper describes a method for checking the acceptability of paraphrases in context. We use the Google n-gram data and a CCG parser to certify the paraphrasing grammaticality a...
Ching-Yun Chang, Stephen Clark
IPPS
2008
IEEE
15 years 4 months ago
Multi-source video multicast in peer-to-peer networks
We propose a novel framework for multi-source video streaming in peer-to-peer (P2P) networks. Multiple videos are distributed to all requesting peers exploiting full collaboration...
Francisco de Asís López-Fuentes, Eck...
TRIDENTCOM
2008
IEEE
15 years 4 months ago
Performance of P2P live video streaming systems on a controlled test-bed
We evaluate and compare the performance of three P2P streaming systems that are capable of streaming live video on the Internet by testing them on a carefully controlled, traffic...
Sachin Agarwal, Jatinder Pal Singh, Aditya Mavlank...