Skip to search formSkip to main contentSkip to account menu

High-water mark (computer security)

Known as: Low watermark (computer security), High watermark, Low watermark 
Under high-water mark, any object less than the user's security level can be opened, but the object is relabeled to reflect the highest security… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Intellectual property (IP) cores have emerged as a promising solution to the challenges of future design as well as mounting time… 
2016
2016
This comment critically analyses the justification and operation of the ‘advocating terrorism’ offence quietly introduced into s… 
2015
2015
In this paper, we propose a new reversible watermarking of medical images for the applications in telemedicine. By using a bit… 
2011
2011
This article proposes a reversible high-capacity watermarking algorithm for the H.264/AVC video standard. The technique applies… 
2006
2006
Quantization-based schemes, such as scalar DC-QIM, have demonstrated performance merits for data-hiding problem, which is mainly… 
2006
2006
In this paper we propose a novel watermarking scheme for image authentication. A high localization of tampering detection is… 
2004
2004
A general watermarking scheme employing lattice quantization is proposed and analyzed. This scheme is based on the equivalence of… 
2004
2004
This paper proposes a blind audio watermark extraction technique that allows performing watermark decoding while installing data… 
2003
2003
Gas turbine engine superalloy airfoils and other components having unique microstructures and novel combinations of physical… 
2002
2002
Abstract : The benefits of this approach can be determined by the results. All of our E/F major milestones were achieved on or…