We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for ...
Bill G. Horne, Lesley R. Matheson, Casey Sheehan, ...
The development of watermarking schemes in the literature is generally guided by a power constraint on the watermark to be embedded into the host. In a steganographic framework the...
The importance of digital watermarking for digital assets such as relational databases to preserve their copyrights is becoming more and more important as time goes by. In the pas...
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
Watermarking allows robust and unobtrusive insertion of information in a digital document. Very recently, techniques have been proposed for watermarking relational databases or XM...