Linear and Nonlinear Oblivious Data Hiding
نویسندگان
چکیده
منابع مشابه
Linear and Nonlinear Oblivious Data Hiding
The majority of the existing data hiding schemes are based on the direct-sequence (DS) modulation where a low-power random sequence is embedded into the original cover signal to represent hidden information. In this paper, we investigate linear and nonlinear modulation approaches in digital data hiding. One typical DS modulation algorithm is explored and its optimal oblivious detector is derive...
متن کاملOblivious Transfer and Linear Functions
We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiver only learns one of the bits sent, holds if and only if the receiver has no information on the XOR of the two bits. We then generalize this to 1-2 OT of strings and show that the security can be characterized in terms of bina...
متن کاملDEA cross efficiency evaluation in presence of linear and nonlinear data
Cross-efficiency is an effective approach for evaluation of DMUs which can be performed with different secondary goals. DEA and cross-efficiency view all variables as behaving in a linear fashion and regardless of the amounts of a variable held by DMUs, DEA apply a same multiplier to those various amounts. But in certain situations this linearity assumption is not appropriate, and the conventio...
متن کاملProviding comprehensive control chart for monitoring of linear and nonlinear profiles using functional data analysis.
Considering profiles as functional variables, two control charts are proposed for their monitoring in phase II. Due to its conformity with the nature of real-world profiles, applying functional model leads to proposed control charts obtained through functional data analysis techniques with desired features. These include simplicity in calculation and possibility of using them for different prof...
متن کاملData-Oblivious Data Structures
An algorithm is called data-oblivious if its control flow and memory access pattern do not depend on its input data. Data-oblivious algorithms play a significant role in secure cloud computing, since programs that are run on secret data—as in fully homomorphic encryption or secure multiparty computation—must be data-oblivious. In this paper, we formalize three definitions of data-obliviousness ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EURASIP Journal on Advances in Signal Processing
سال: 2004
ISSN: 1687-6172,1687-6180
DOI: 10.1155/s1110865704403059