Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,276,776 papers from all fields of science
Search
Sign In
Create Free Account
High-water mark (computer security)
Known as:
Low watermark (computer security)
, High watermark
, Low watermark
Expand
Under high-water mark, any object less than the user's security level can be opened, but the object is relabeled to reflect the highest security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Bell–LaPadula model
Biba Model
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Timon: A Timestamped Event Database for Efficient Telemetry Data Processing and Analytics
Wei Cao
,
Yusong Gao
,
+7 authors
Gejin Zhang
SIGMOD Conference
2020
Corpus ID: 218982001
With the increasing demand for real-time system monitoring and tracking in various contexts, the amount of time-stamped event…
Expand
2016
2016
Treason, Terrorism and Imprecision: Locating s 80.2C of the Criminal Code (Cth) in the Taxonomy of Crimes against the State
B. Brooks
2016
Corpus ID: 147787089
This comment critically analyses the justification and operation of the ‘advocating terrorism’ offence quietly introduced into s…
Expand
Highly Cited
2013
Highly Cited
2013
Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain
R. Preda
2013
Corpus ID: 28386588
2009
2009
Blind Robust 3-D Mesh Watermarking Based on Oblate Spheroidal Harmonics
John M. Konstantinides
,
A. Mademlis
,
P. Daras
,
P. Mitkas
,
M. Strintzis
IEEE transactions on multimedia
2009
Corpus ID: 18039290
In this paper, a novel transform-based, blind and robust 3-D mesh watermarking scheme is presented. The 3-D surface of the mesh…
Expand
2008
2008
Content-Based Watermarking by Geometric Warping and Feature-Based Image Segmentation
Dima Pröfrock
,
M. Schlauweg
,
E. Müller
2008
Corpus ID: 17595058
In this work, we present a new content-based watermarking approach that uses geometric warping to embed watermarks with high…
Expand
2006
2006
Performance Analysis of Scalar DC-QIM Forwatermark Detection
Jean-Philippe Boyer
,
P. Duhamel
,
J. Blanc-Talon
IEEE International Conference on Acoustics Speech…
2006
Corpus ID: 14834510
Quantization-based schemes, such as scalar DC-QIM, have demonstrated performance merits for data-hiding problem, which is mainly…
Expand
Review
2004
Review
2004
ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY
N. Cvejic
2004
Corpus ID: 17095617
Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for…
Expand
2004
2004
Mapping Energy Video Watermarking Algorithm Based on Compressed Domain
Lijun Wang
,
H. Yao
,
Shaohui Liu
,
Wen Gao
Pacific Rim Conference on Multimedia
2004
Corpus ID: 38552451
The paper presents a novel video watermarking scheme called Mapping Energy video Watermarking (MEW) for copyright protection. The…
Expand
Highly Cited
2003
Highly Cited
2003
Transforming Local Governance
G. Stoker
Government Beyond the Centre
2003
Corpus ID: 40572917
Highly Cited
2002
Highly Cited
2002
Virtual-topology adaptation for WDM mesh networks under dynamic traffic
Aysegul Yayimli
,
B. Mukherjee
Proceedings.Twenty-First Annual Joint Conference…
2002
Corpus ID: 7097639
We present a new approach to the virtual-topology reconfiguration problem for wavelength-routed, optical wide-area networks under…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE