In this paper, we propose a new method for hiding a signature image in the host image. We encode the signature image by a balanced two-description subband coder and embed the descr...
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks t...
A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable fashion. In case of a dispute, however, a des...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
In this paper, we propose a dynamic QoS, D-QoS, model which allows the QoS requirements be reconfigured dynamically. A privilege user can request a network interruption to guarant...
Modeling software components from multiple perspectives provides complementary views of a software system and enables sophisticated analyses of its functionality. A software compon...