Sciweavers

8 search results - page 2 / 2
» JPEG Steganography: A Performance Evaluation of Quantization...
Sort
View
ICIP
2001
IEEE
16 years 1 months ago
Hierarchical watermarking depending on local constraints
In this paper we propose a new watermarking technique where the watermark is embedded according to two keys. The first key is used to embed a code bit in a block of pixels. The se...
Christopher D. Coltman, Adrian G. Bors
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 9 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
SIGMOD
2007
ACM
179views Database» more  SIGMOD 2007»
15 years 11 months ago
How to barter bits for chronons: compression and bandwidth trade offs for database scans
Two trends are converging to make the CPU cost of a table scan a more important component of database performance. First, table scans are becoming a larger fraction of the query p...
Allison L. Holloway, Vijayshankar Raman, Garret Sw...