Sciweavers

666 search results - page 22 / 134
» Fair watermarking techniques
Sort
View
CCS
2001
ACM
15 years 2 months ago
Dynamic Self-Checking Techniques for Improved Tamper Resistance
We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for ...
Bill G. Horne, Lesley R. Matheson, Casey Sheehan, ...
IWDW
2005
Springer
15 years 3 months ago
On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints
The development of watermarking schemes in the literature is generally guided by a power constraint on the watermark to be embedded into the host. In a steganographic framework the...
Mark T. Hogan, Félix Balado, Neil J. Hurley...
ACMSE
2008
ACM
14 years 12 months ago
A new watermarking approach for relational data
The importance of digital watermarking for digital assets such as relational databases to preserve their copyrights is becoming more and more important as time goes by. In the pas...
Vahab Pournaghshband
IH
2005
Springer
15 years 3 months ago
Information-Theoretic Analysis of Security in Side-Informed Data Hiding
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
Luis Pérez-Freire, Pedro Comesaña, F...
PODS
2003
ACM
135views Database» more  PODS 2003»
15 years 10 months ago
Query-preserving watermarking of relational databases and XML documents
Watermarking allows robust and unobtrusive insertion of information in a digital document. Very recently, techniques have been proposed for watermarking relational databases or XM...
David Gross-Amblard