Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,401,948 papers from all fields of science
Search
Sign In
Create Free Account
High-water mark (computer security)
Known as:
Low watermark (computer security)
, High watermark
, Low watermark
Expand
Under high-water mark, any object less than the user's security level can be opened, but the object is relabeled to reflect the highest security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Bell–LaPadula model
Biba Model
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Embedding low cost optimal watermark during high level synthesis for reusable IP core protection
A. Sengupta
,
Saumya Bhadauria
,
S. Mohanty
International Symposium on Circuits and Systems
2016
Corpus ID: 25110053
Intellectual property (IP) cores have emerged as a promising solution to the challenges of future design as well as mounting time…
Expand
2016
2016
Treason, Terrorism and Imprecision: Locating s 80.2C of the Criminal Code (Cth) in the Taxonomy of Crimes against the State
B. Brooks
2016
Corpus ID: 147787089
This comment critically analyses the justification and operation of the ‘advocating terrorism’ offence quietly introduced into s…
Expand
2015
2015
Reversible and embedded watermarking of medical images for telemedicine
Chung-Yen Su
,
Jeng-Ji Huang
,
Che-Yang Shih
,
Yu-Tang Chen
International Conference on Industrial Networks…
2015
Corpus ID: 16255439
In this paper, we propose a new reversible watermarking of medical images for the applications in telemedicine. By using a bit…
Expand
2011
2011
Multi-layer watermarking of H.264/AVC video using Differential Expansion on IPCM blocks
M. A. Ali
,
E. Edirisinghe
IEEE International Conference on Consumer…
2011
Corpus ID: 42044098
This article proposes a reversible high-capacity watermarking algorithm for the H.264/AVC video standard. The technique applies…
Expand
2006
2006
Performance Analysis of Scalar DC-QIM Forwatermark Detection
Jean-Philippe Boyer
,
P. Duhamel
,
J. Blanc-Talon
IEEE International Conference on Acoustics Speech…
2006
Corpus ID: 14834510
Quantization-based schemes, such as scalar DC-QIM, have demonstrated performance merits for data-hiding problem, which is mainly…
Expand
2006
2006
Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability
Huajian Liu
,
M. Steinebach
Automated Production of Cross Media Content for…
2006
Corpus ID: 19462921
In this paper we propose a novel watermarking scheme for image authentication. A high localization of tampering detection is…
Expand
2004
2004
Lattice Costa schemes using subspace projection for digital watermarking
R. Fischer
,
Roman Tzschoppe
,
R. Bäuml
Transactions on Emerging Telecommunications…
2004
Corpus ID: 9923596
A general watermarking scheme employing lattice quantization is proposed and analyzed. This scheme is based on the equivalence of…
Expand
2004
2004
An integrated decoding framework for audio watermark extraction
Y. Yaslan
,
Bilge Günsel
Proceedings of the 17th International Conference…
2004
Corpus ID: 2600123
This paper proposes a blind audio watermark extraction technique that allows performing watermark decoding while installing data…
Expand
2003
2003
Sparking life: notes on the performance capture sessions for the Lord of the Rings: the Two Towers
R. Scott
COMG
2003
Corpus ID: 40689870
Gas turbine engine superalloy airfoils and other components having unique microstructures and novel combinations of physical…
Expand
2002
2002
Program Management Process on F/A-18E/F--New Directions
R. Odum
,
N. Babich
,
B. Hunt
,
R. LePoint
,
J. Shedd
2002
Corpus ID: 108113796
Abstract : The benefits of this approach can be determined by the results. All of our E/F major milestones were achieved on or…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE