Sciweavers

977 search results - page 37 / 196
» Secret image sharing
Sort
View
IWDW
2009
Springer
15 years 4 months ago
Fast Embedding Technique for Dirty Paper Trellis Watermarking
This paper deals with the improvement of the Dirty Paper Trellis Code (DPTC) watermarking algorithm. This watermarking algorithm is known to be one of the best among the high rate ...
Marc Chaumont
CSREASAM
2006
15 years 1 months ago
Case Study: An Implementation of a Secure Steganographic System
- In this paper, we present the development of a Windows-based application implemented on the Microsoft .NET platform as a framework to allow a user to first compress and encrypt a...
Xuan-Hien Dang, Krishna C. S. Kota
CVPR
2010
IEEE
15 years 5 months ago
Secrets of Optical Flow Estimation and Their Principles
The accuracy of optical flow estimation algorithms has been improving steadily as evidenced by results on the Middlebury optical flow benchmark. The typical formulation, however...
Deqing Sun, Stefan Roth, Michael Black
CTRSA
2005
Springer
138views Cryptology» more  CTRSA 2005»
15 years 5 months ago
CryptoGraphics: Secret Key Cryptography Using Graphics Cards
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by exploiting the ability for GPUs to simultaneously process large quantities of pi...
Debra L. Cook, John Ioannidis, Angelos D. Keromyti...
IJNSEC
2007
161views more  IJNSEC 2007»
14 years 11 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang