Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

High-water mark (computer security)

Known as: Low watermark (computer security), High watermark, Low watermark 
Under high-water mark, any object less than the user's security level can be opened, but the object is relabeled to reflect the highest security… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Reusable intellectual property (IP) cores used in the consumer electronic devices, representing years of valuable investment… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
A low complexity, pixel based watermarking technique has been used in this paper on the edge areas of an image to improve the… Expand
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Abstract This paper proposes a novel image authentication scheme in the wavelet domain. The scheme uses a semi-fragile watermark… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
NAND flash memory is a preferred storage media for various platforms ranging from embedded systems to enterprise-scale systems… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 5
Is this relevant?
2009
2009
In this paper, we propose a high capacity data hiding method in binary document images towards semi-fragile authentication… Expand
  • figure 1
  • figure 2
  • figure 4
  • table 1
Is this relevant?
2006
2006
Quantization-based schemes, such as scalar DC-QIM, have demonstrated performance merits for data-hiding problem, which is mainly… Expand
  • figure 2
  • figure 1
  • figure 5
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
  • G. Stoker
  • Government Beyond the Centre
  • 2004
  • Corpus ID: 40572917
 
  • table 1.1
  • table 1.2
  • table 2.1
  • table 2.2
  • table 2.3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We present a new approach to the virtual-topology reconfiguration problem for a wavelength-division-multiplexing-based optical… Expand
Is this relevant?
2001
2001
The BaBar Copy Program(bbcp) is an excellent representative of peer-to-peer(P2P) computing.It is also a pioneering application of… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We propose a set of baseline heuristics for identifying genuinely tabular information and news links in HTML documents. A… Expand
  • table 1
Is this relevant?