Sciweavers

666 search results - page 34 / 134
» Fair watermarking techniques
Sort
View
IJIT
2004
14 years 11 months ago
A Lossless Watermarking Based Authentication System For Medical Images
In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to frag...
Samia Boucherkha, Mohamed Benmohamed
ICDE
2005
IEEE
167views Database» more  ICDE 2005»
15 years 11 months ago
Privacy and Ownership Preserving of Outsourced Medical Data
The demand for the secondary use of medical data is increasing steadily to allow for the provision of better quality health care. Two important issues pertaining to this sharing o...
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Rober...
TCSV
2008
124views more  TCSV 2008»
14 years 9 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang
ASIACRYPT
2004
Springer
15 years 3 months ago
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
An untraceable fair network payment protocol is proposed by Wang in Asiacrypt’03, which employs the existent techniques of the offline untraceable cash and a new technique calle...
Feng Bao
ICIP
2005
IEEE
15 years 11 months ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka