• Aucun résultat trouvé

INFORMATION HIDING

Quantitative Approaches to Information Hiding

Quantitative Approaches to Information Hiding

... quantifying information hiding in communication ...some information to the ...our information-hiding systems, whose behaviour can be modeled very conveniently as probabilistic ...

114

Compositional methods for information-hiding

Compositional methods for information-hiding

... 1.1. Information theory At an abstract level information-hiding protocols can be viewed as information-theoretic ...secret information that we want to protect and O the facts that the ...

28

Information Hiding in Probabilistic Concurrent Systems (journal version)

Information Hiding in Probabilistic Concurrent Systems (journal version)

... • We illustrate the problem with full-information schedulers in security, our solution providing admissible schedulers, and the application of our proving technique by means of the well [r] ...

33

Formal approaches to information hiding : An analysis of interactive systems, statistical disclosure control, and refinement of specifications

Formal approaches to information hiding : An analysis of interactive systems, statistical disclosure control, and refinement of specifications

... me hanisms while preserving dierential priva y. The authors proposed adding noise to the output of the query a ording to the geometri me hanism. Their framework is very interesting in the sense it provides a general ...

190

Asynchronous Process Calculi for Specification and Verification of Information Hiding Protocols

Asynchronous Process Calculi for Specification and Verification of Information Hiding Protocols

... external information on X before computing the possible transitions of P under the current ...store information related to X and keeps it private for the ...

159

Information Hiding, Inheritance and Concurrency

Information Hiding, Inheritance and Concurrency

... Unité de recherche INRIA Rocquencourt Domaine de Voluceau - Rocquencourt - BP 105 - 78153 Le Chesnay Cedex France Unité de recherche INRIA Lorraine : LORIA, Technopôle de Nancy-Brabois -[r] ...

78

Hiding Design-Decisions in Service-Oriented Software via Service Abstraction Recovery

Hiding Design-Decisions in Service-Oriented Software via Service Abstraction Recovery

... of information hiding [13]; the typical technique to reduce coupling between an application and a set of alternative design-decisions that solve the same problem differently is to hide these design- ...

11

Advanced secure information retrieval technology for multilayer information extraction

Advanced secure information retrieval technology for multilayer information extraction

... 3D information extraction using two-photon exci- tation, depth scanning devices are required, collaborated with a 2D extraction ...the information encoded in layers will be retrieved layer by ...encoding ...

13

Income Hiding and Informal Redistribution: A Lab-in-the-Field Experiment in Senegal

Income Hiding and Informal Redistribution: A Lab-in-the-Field Experiment in Senegal

... We conducted the lab-in-the-field experiment in May and June 2014 in poor, densely populated urban communities in the Dakar region, in Senegal on a final sample of 797 individuals. First, we find a high ...

57

Hiding in the Crowd: A Massively Distributed Algorithm for Private Averaging with Malicious Adversaries

Hiding in the Crowd: A Massively Distributed Algorithm for Private Averaging with Malicious Adversaries

... estimation accuracy that the adversary can achieve. Mo and Murray (2014) proposed to add and subtract exponentially decaying Gaussian noise, also ensuring convergence to the exact average. They consider only ...

18

Une information sur les matrices de covariance : la liaison-information

Une information sur les matrices de covariance : la liaison-information

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ...

79

Hiding in plain sight: vesicle-mediated export and transmission of prion-like proteins

Hiding in plain sight: vesicle-mediated export and transmission of prion-like proteins

... Vertical transmission of yeast prions could be mediated by propagons packaged within intracellular vesicles (solid green arrow) transported from mother to daughter [r] ...

4

Income Hiding and Informal Redistribution: A Lab in the Field Experiment in Senegal

Income Hiding and Informal Redistribution: A Lab in the Field Experiment in Senegal

... people hiding, their household members, their kin outside the household, or their neighbors? To answer these questions, we conducted an experiment in Senegal that uniquely combines a ran- domized controlled trial ...

56

Information system upon information systems - RERO DOC

Information system upon information systems - RERO DOC

... ATTRIBUTE ItemCode TERMINATION Code (1,1) ATTRIBUTE ItemName TERMINATION Name (0,1) ATTRIBUTE ItemDescription TERMINATION Text (0,1) ATTRIBUTE ItemUnitPrice TER[r] ...

202

A high-rate data hiding technique for audio signals based on IntMDCT quantization

A high-rate data hiding technique for audio signals based on IntMDCT quantization

... For each frame t and for each frequency bin f , the PAM (Block ②) provides a masking threshold M(t, f ) used to compute the embedding capacity C(t, f ) (Block ③), i.e. the maximum size of the binary code to be embedded ...

5

Composite information systems : a new concept in information systems

Composite information systems : a new concept in information systems

... virtual machines and for resolving data format differences among the user's execution environments and the various database.. These strategies include: use of shared virtual disk.[r] ...

134

Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding

Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding

... Additionally, we propose a new secure watermarking scheme based on distribution of vector norms in the Gaussian case.. We illustrate model-based embedding performance in the case of Gaus[r] ...

17

Hiding from Whom? Threat-models and in-the-making encryption technologies

Hiding from Whom? Threat-models and in-the-making encryption technologies

... “Know your enemy”: threat-modelling as a tool for trainers In design studies and software engineering, threat-modelling is considered as an inherent part of the normal design cycle where ‘security needs’ are understood ...

20

Mutual information, Fisher information and population coding

Mutual information, Fisher information and population coding

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ...

30

Voicing of Animated GIF by Data Hiding A Technique to Add Sound to the GIF Format

Voicing of Animated GIF by Data Hiding A Technique to Add Sound to the GIF Format

... can handle as it is used both for web applications with HTML5 and javascript as for desktop applications [1]. 6 Conclusion This paper presents an original and low complexity technique to add sounds to animated GIF ...

18

Show all 2358 documents...

Sujets connexes