Sciweavers

909 search results - page 88 / 182
» Reversible data hiding
Sort
View
BIOID
2008
101views Biometrics» more  BIOID 2008»
14 years 12 months ago
Template Protection for On-Line Signature-Based Recognition Systems
Abstract. Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two dif...
Emanuele Maiorana, Patrizio Campisi, Alessandro Ne...
JDCTA
2008
535views more  JDCTA 2008»
14 years 9 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
NAACL
2010
14 years 7 months ago
Linguistic Steganography Using Automatically Generated Paraphrases
This paper describes a method for checking the acceptability of paraphrases in context. We use the Google n-gram data and a CCG parser to certify the paraphrasing grammaticality a...
Ching-Yun Chang, Stephen Clark
WCRE
2009
IEEE
15 years 4 months ago
Supporting Feature-Level Software Maintenance
The proposed research defines data fusion approaches to support software maintenance tasks at the feature level. Static, dynamic, and textual sources of information are combined t...
Meghan Revelle
SCAM
2006
IEEE
15 years 3 months ago
Linking Analysis and Transformation Tools with Source-Based Mappings
This paper discusses an approach to linking separate analysis and transformation tools, such that analysis results can be used to guide transformations. Our approach consists of t...
Magiel Bruntink