Sciweavers

977 search results - page 27 / 196
» Secret image sharing
Sort
View
CSFW
2010
IEEE
15 years 3 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
MMSEC
2005
ACM
147views Multimedia» more  MMSEC 2005»
15 years 5 months ago
A Bayesian image steganalysis approach to estimate the embedded secret message
Image steganalysis so far has dealt only with detection of a hidden message and estimation of some of its parameters (e.g., message length and secret key). To our knowledge, so fa...
Aruna Ambalavanan, Rajarathnam Chandramouli
CCS
2007
ACM
15 years 6 months ago
Do background images improve "draw a secret" graphical passwords?
Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical analysis suggests that DAS supports an overall password space larger than that of the ubiqu...
Paul Dunphy, Jeff Yan
JIPS
2010
273views more  JIPS 2010»
14 years 6 months ago
Hiding Secret Data in an Image Using Codeword Imitation
This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to...
Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai
IWDW
2005
Springer
15 years 5 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...