Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2022
Substream management in distributed streaming dataflows
DEBS '22: Proceedings of the 16th ACM International Conference on Distributed and Event-Based SystemsPages 55–66https://doi.org/10.1145/3524860.3539809Most state-of-the-art SPEs use punctuations to divide a stream into bounded substreams of messages, such as epochs and windows. The punctuation approach is powerful but has limitations: it does not support cyclic dataflows, is poorly scalable in some ...
- research-articleJune 2021
Klink: Progress-Aware Scheduling for Streaming Data Systems
SIGMOD '21: Proceedings of the 2021 International Conference on Management of DataPages 485–498https://doi.org/10.1145/3448016.3452794Modern stream processing engines (SPEs) process large volumes of events propagated at high velocity through multiple queries. To improve performance, existing SPEs generally aim to minimize query output latency by minimizing, in turn, the propagation ...
- ArticleOctober 2013
Towards Estimation of Quality of Watermarked Audio Signal Using Objective Measures
IIH-MSP '13: Proceedings of the 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal ProcessingPages 279–282https://doi.org/10.1109/IIH-MSP.2013.78This paper compares two objective audio quality assessment measures calculated for three watermark methods with its corresponding subjective quality. The aim was to see if these measures could be used to estimate the subjective audio quality with ...
- short-paperOctober 2013
Impact of multiple watermarks for protecting copyright of applications on smart mobile devices
RACS '13: Proceedings of the 2013 Research in Adaptive and Convergent SystemsPages 359–360https://doi.org/10.1145/2513228.2513329Smart mobile devices such as smartphones and smart-pads based on Android or iOS are becoming more widely used. As smart mobile devices are increasingly used, their applications are also widely used for various purposes. Illegal uses of copyrighted ...
- articleMay 2013
A Novel Watermarking Scheme for Secure Relational Databases
Information Security Journal: A Global Perspective (ISJGP), Volume 22, Issue 3Pages 105–116https://doi.org/10.1080/19393555.2013.801538Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection and tamper detection and to maintain the integrity of data. Sectors such as defense, finance, and human resources require reliable schemes, ...
- ArticleMay 2012
Hiding a second appearance in a physical relief surface
IH'12: Proceedings of the 14th international conference on Information HidingPages 94–109https://doi.org/10.1007/978-3-642-36373-3_7We present a novel information hiding process that couples geometrical modeling with automated 3D fabrication for creating hidden-appearance reliefs. Our relief surface produces a first grayscale appearance visible by simple direct illumination and a ...
- articleDecember 2009
Visual-based embedding systems with targeted secret disclosures and applications
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Volume 4, Issue 1Pages 44–53https://doi.org/10.1504/IJAHUC.2009.021913In this paper, a VWC-system is proposed. In the system, the embedded information can hold the secret for the encryption key. The system adopts the technique of frequency-domain watermarking and visual cryptography, respectively. Furthermore, the ...
- articleDecember 2009
Buyer-seller watermarking protocols with off-line trusted third parties
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Volume 4, Issue 1Pages 36–43https://doi.org/10.1504/IJAHUC.2009.021912In a buyer-seller watermarking protocol, buyers and sellers protect the ownerships or copyrights of their digital contents through the watermarks embedded in them. However, some known attacks and problems are still threatening the security of the ...
- ArticleFebruary 2005
Patterns of plagiarism
SIGCSE '05: Proceedings of the 36th SIGCSE technical symposium on Computer science educationPages 383–387https://doi.org/10.1145/1047344.1047473We used a new technique to analyse how students plagiarise programs in an introductory programming course. This involved placing a watermark on a student's program and monitoring programs for the watermark during assignment submission. We obtained and ...
Also Published in:
ACM SIGCSE Bulletin: Volume 37 Issue 1 - ArticleApril 2001
Improved Boneh-Shaw Content Fingerprinting
CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSAPages 378–391We improve on the Boneh-Shaw Fingerprinting scheme in two ways: (i) We merge a Direct Sequence Spread Spectrum (DSSS) embedding layer with the first Boneh-Shaw layer (the so called " code"), effiectively increasing the protected object size by about ...
- ArticleJune 1996
Digital Watermarks for Audio Signals
ICMCS '96: Proceedings of the 1996 International Conference on Multimedia Computing and SystemsPage 0473In this paper, we present a novel technique for embedding digital ``watermarks'' into digital audio signals. Watermarking is a technique used to label digital media by hiding copyright or other information into the underlying data. The watermark must be ...
- ArticleJune 1996
Digital Watermarks for Audio Signals
ICMCS '96: Proceedings of the 1996 International Conference on Multimedia Computing and SystemsPage 473https://doi.org/10.1109/MMCS.1996.535015In this paper, we present a novel technique for embedding digital ``watermarks'' into digital audio signals. Watermarking is a technique used to label digital media by hiding copyright or other information into the underlying data. The watermark must be ...