14th International Conference on Computer and Information Technology (ICCIT 2011) 2011
DOI: 10.1109/iccitechn.2011.6164872
|View full text |Cite
|
Sign up to set email alerts
|

Signature hiding and recovery in a graph coloring solutions using modified genetic algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…(2005) demonstrate a WCC bound of type (4.9) in . Various extensions of these results are given in Saha and Tewari (2011), Dekel, Eldan and Koren (2015) and Gasnikov et al. (2017).…”
Section: Methods For Convex Objectivesmentioning
confidence: 81%
“…(2005) demonstrate a WCC bound of type (4.9) in . Various extensions of these results are given in Saha and Tewari (2011), Dekel, Eldan and Koren (2015) and Gasnikov et al. (2017).…”
Section: Methods For Convex Objectivesmentioning
confidence: 81%
“…The most common approaches to protect graph-type data are: adding new nodes [1]; inserting extra edges [2] and embedding sub-graph [3]. Since these approaches are based on the node domain, they are not robust to many attacks and not secure.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper we are concerned with protection and authentication of such data captured via a network of sensors. However, there have been limited works on this aspect of addressing irregular graph structures.The most common approaches for protecting graph-type are: adding extra edges between a set of pairs of nodes, which have different colours based on the binary message; Maximal Independent Set (MIS) based on choosing one or more set(s) from the original graph such that the set is independent [1]; inserting new nodes to the original graph and connect them depending on the binary message [2] and hiding a sub-graph which is generated from a watermark [3]. Since these works are based on vertex domain, they are not robust to data processing, noise removal or geometrical attacks, such as, adding new nodes, edges or sub-graphs.…”
Section: Introductionmentioning
confidence: 99%