Editorial: Embedded Security Challenge: Cyber Security Contests in the Embedded Computing Domain
Abstract
- Editorial: Embedded Security Challenge: Cyber Security Contests in the Embedded Computing Domain
Recommendations
A region-adaptive semi-fragile dual watermarking scheme
Since existing watermarking schemes usually have only a single function, a region-adaptive semi-fragile dual watermarking scheme is proposed, taking into account both watermark embedding capacity and security. The dual watermarks refer to the robust ...
A steganographic method based upon JPEG and quantization table modification
Special issue: Intelligent multimedia computing and networkingIn this paper, a novel steganographic method based on joint photographic expert-group (JPEG) is proposed. The proposed method modifies the quantization table first. Next, the secret message is hidden in the cover-image with its middle-frequency of the ...
Guest Editorial Introduction to Special Section on Modern Reversible Data Hiding and Watermarking
The rapid development and growing of 4G and 5G mobile networks allow people all over the world to efficiently transmit and share data and information while bringing an increasing demand on information security. Data hiding is a general technique to embed ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Journal Family
Publication History
Check for updates
Qualifiers
- Editorial
- Opinion
- Refereed limited
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 438Total Downloads
- Downloads (Last 12 months)57
- Downloads (Last 6 weeks)12
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in