Sciweavers

7084 search results - page 45 / 1417
» Hiding Information in Images
Sort
View
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
15 years 6 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
ICIP
2010
IEEE
14 years 10 months ago
Undetectable image tampering through JPEG compression anti-forensics
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting ...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
99
Voted
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
15 years 7 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
124
Voted
SSWMC
2004
15 years 2 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu