Hiding Contextual Information for Defending a Global Attacker
نویسندگان
چکیده
منابع مشابه
Resilient Information Hiding for
Most work on watermarking has resulted in techniques for different types of data: image, audio, video, text/language, software, etc. In this paper we discuss the watermarking of abstract structured aggregates of multiple types of content, such as multi-type/media documents. These semi-structures can be usually represented as graphs and are characterized by value lying both in the structure and ...
متن کاملDefining A New Type of Global Information Architecture for Contextual Information Processing
In this paper, we introduce a new model for global integration of disparate data about thematic events into an information context. Such a model has a context that controls the processing and derivation of knowledge from a context. The context of the information also can control the dissemination the information and the knowledge derived from it. A semantic based processing grammar is then deve...
متن کاملInformation Hiding—A Survey
Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised copying directly. Military communications systems make increasing use of traffic security techniq...
متن کاملCompositional Methods for Information-Hiding
Systems concerned with information hiding often use randomization to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a system can be expressed in terms of the probability of error associated to the inference of the secret information. We consider a probabilistic process calculus to specify such systems, and we study how the op...
متن کاملInformation Hiding in Parallel Programs Information Hiding in Parallel Programs
ions that together allow these decisions to be isolated and hidden. Virtual topolo-gies, virtual channels, and lightweight processes provide mechanisms for isolating mapping,communication, and scheduling decisions, while port arrays allow these techniques to beapplied to program components that must execute on many processors.In addition to describing the abstractions, we have s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2018
ISSN: 2169-3536
DOI: 10.1109/access.2018.2869947