Sciweavers

2259 search results - page 16 / 452
» Separation and information hiding
Sort
View
87
Voted
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
15 years 10 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
SSWMC
2004
14 years 11 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
ICIP
2004
IEEE
15 years 11 months ago
Estimating and undoing rotation for print-scan resilient data hiding
This paper proposes a method to hide information into images that achieves robustness against printing and scanning with blind decoding. A significant contribution of this paper i...
Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath,...
ICIP
2004
IEEE
15 years 11 months ago
Data hiding using trellis coded quantization
Information theoretic tools lead to the design and analysis of new blind data hiding methods. A novel quantizationbased blind method, which uses trellis coded quantization, is pro...
Ersin Esen, A. Aydin Alatan
TIFS
2008
152views more  TIFS 2008»
14 years 9 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...