Sciweavers

236 search results - page 3 / 48
» From Weak to Strong Watermarking
Sort
View
ICIP
2009
IEEE
14 years 7 months ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
HICSS
2008
IEEE
101views Biometrics» more  HICSS 2008»
14 years 22 days ago
The Value of Weak vs. Strong Ties between Individuals and Projects for New Product Review
This study extends the concept of weak and strong ties to the relationship between an individual and a project, in the context of a formal review process. Using data collected fro...
Lynne P. Cooper
AI
2006
Springer
13 years 6 months ago
Solving logic program conflict through strong and weak forgettings
We consider how to forget a set of atoms in a logic program. Intuitively, when a set of atoms is forgotten from a logic program, all atoms in the set should be eliminated from thi...
Yan Zhang, Norman Y. Foo
POLICY
2009
Springer
14 years 25 days ago
Strong and Weak Policy Relations
—Access control and privacy policy relations tend to focus on decision outcomes and are very sensitive to defined terms and state. Small changes or updates to a policy language ...
Michael J. May, Carl A. Gunter, Insup Lee, Steve Z...
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
12 years 6 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert