Sciweavers

8468 search results - page 1614 / 1694
» The Technology of Data Stashing
Sort
View
IH
2007
Springer
15 years 4 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...
IH
2007
Springer
15 years 4 months ago
Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction
Abstract. Hard decisions constitute the major problem in digital watermarking applications, especially when content adaptive embedding methods are used. Soft-decision decoding, on ...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
ISW
2007
Springer
15 years 4 months ago
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
The stream ciphers Py, Py6 designed by Biham and Seberry were promising candidates in the ECRYPT-eSTREAM project because of their impressive speed. Since their publication in Apri...
Gautham Sekar, Souradyuti Paul, Bart Preneel
LOCA
2007
Springer
15 years 4 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...
SEMWEB
2007
Springer
15 years 4 months ago
Media Watch on Climate Change: Building and Visualizing Contextualized Information Spaces
Abstract. This paper presents the ’Media Watch on Climate Change’, an interactive Web portal that combines a portfolio of semantic services with a visual interface based on tig...
Arno Scharl, Albert Weichselbraun, Alexander Hubma...
« Prev « First page 1614 / 1694 Last » Next »