Sciweavers

1640 search results - page 114 / 328
» Deriving Private Information from Randomized Data
Sort
View
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 4 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
HICSS
2000
IEEE
115views Biometrics» more  HICSS 2000»
15 years 1 months ago
Utility Information Integration - Vision, Benefits, Strategies, and Status
: Successfully incorporating utility engineering functions into business decisions requires integrating the numeric-intensive world of the engineer with business systems that are d...
S. F. Mauser, J. Gillerman, D. Nordell
ICASSP
2009
IEEE
15 years 4 months ago
Secure image retrieval through feature protection
This paper addresses the problem of image retrieval from an encrypted database, where data confidentiality is preserved both in the storage and retrieval process. The paper focus...
Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, M...
ISBI
2002
IEEE
15 years 10 months ago
Fast model based segmentation of ultrasound data using an active image
In the present paper we propose a method for fast segmentation of ultrasound data. It is based on setting up a model depending on user input. We apply a matching scheme in order t...
Dieter Hönigmann, Helmut Pottmann, Johannes R...
CIKM
2008
Springer
14 years 12 months ago
Scalable complex pattern search in sequential data
Searching data streams has been traditionally very limited, either in the complexity of the search or in the size of the searched dataset. In this paper, we investigate the design...
Leila Kaghazian, Dennis McLeod, Reza Sadri