-
Eventually, Mr Sharma expects to see Xerox scanners and copiers with data-hiding functions built into them.
ECONOMIST: MONITOR
-
With reversible data-hiding, however, photographic evidence could be watermarked and secured from tampering the moment the shutter is pressed.
ECONOMIST: MONITOR
-
The data-hiding technique neatly fits within the image, and all the authentication tasks are localised, notes Guarav Sharma of Xerox.
ECONOMIST: MONITOR
-
But as Mr Celik outlines the possible applications for reversible data-hiding, it becomes obvious why preserving image integrity is so critical.
ECONOMIST: MONITOR
-
The United States army has expressed an interest in the data-hiding algorithms for combining extremely high-resolution reconnaissance photographs with authentication security.
ECONOMIST: MONITOR
-
Reversible data-hiding offers a clever solution.
ECONOMIST: MONITOR
-
This could result in the compromise of technologies that could be used, for example, in anti-submarine warfare and will afford them data (detailed imagery of underwater access routes, off-shore hiding places, etc.) that could be used to facilitate attacks on this country.
CENTERFORSECURITYPOLICY: President Bush tells base to ��get LOST��