Sciweavers

7084 search results - page 34 / 1417
» Hiding Information in Images
Sort
View
GLOBECOM
2009
IEEE
15 years 1 months ago
A Framework of Multiplicative Spread Spectrum Embedding for Data Hiding: Performance, Decoder and Signature Design
In this paper, we have investigated several aspects of multiplicative spread spectrum (MSS) embedding for Data Hiding. First, we analyze the probability of error of the maximum lik...
Amir Valizadeh, Z. Jane Wang
COMPSAC
2004
IEEE
15 years 1 months ago
Hiding Sensitive Patterns in Association Rules Mining
Data mining techniques have been developed in many applications. However, it also causes a threat to privacy. We investigate to find an appropriate balance between a need for priv...
Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen
GRC
2008
IEEE
14 years 10 months ago
Towards Real-time Performance of Data Value Hiding for Frequent Data Updates
Hiding data values in privacy-preserving data mining (PPDM) protects information against unauthorized attacks while maintaining analytical data properties. The most popular models...
Jie Wang, Justin Zhan, Jun Zhang
HICSS
2010
IEEE
180views Biometrics» more  HICSS 2010»
15 years 4 months ago
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While m...
Craig A. Shue, Minaxi Gupta
COMAD
2008
14 years 11 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...