Sciweavers

666 search results - page 42 / 134
» Fair watermarking techniques
Sort
View
ICLP
1999
Springer
15 years 2 months ago
Finding Fair Allocations for the Coalition Problem with Constraints
Fair allocation of payoffs among cooperating players who can form various coalitions of differing utilities is the classic game theoretic “coalition problem.” Shapley’s va...
Evan Tick, Roland H. C. Yap, Michael J. Maher
IH
2001
Springer
15 years 2 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
ISCAS
2008
IEEE
155views Hardware» more  ISCAS 2008»
15 years 4 months ago
Advanced colluder detection techniques for OSIFT-based hiding codes
— In this work, we examine a family of anti-collusion codes using the principle of “Orthogonal Spreading followed by the Inverse Fourier Transform (OSIFT)” as introduced in [...
Byung-Ho Cha, C. C. Jay Kuo
ICOIN
2012
Springer
13 years 5 months ago
Coordinated TCP Westwood congestion control for multiple paths over wireless networks
— Multipath TCP (MPTCP) has just been approved by the IETF. It was designed to be fairly shared with regular TCP, so its performance is equivalent that of a regular TCP flow tha...
Tuan Anh Le, Choong Seon Hong, Eui-nam Huh
CORR
2006
Springer
115views Education» more  CORR 2006»
14 years 10 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski