To counter the increasing number of online threats for users' privacy and security, this paper explores the design of an ambient security indicator, in form of a standard key...
Alexander De Luca, Bernhard Frauendienst, Max-Eman...
We show that it is possible to significantly improve the accuracy of a general class of histogram queries while satisfying differential privacy. Our approach carefully chooses a...
Michael Hay, Vibhor Rastogi, Gerome Miklau, Dan Su...
In a consumer video, there are not only intended objects, which are intentionally captured by the camcorder user, but also unintended objects, which are accidentally framed-in. Sin...
In this article, a new fragile, blind, high payload capacity, ROI (Region of Interest) preserving Medical image watermarking (MIW) technique in the spatial domain for grayscale med...
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...