Sciweavers

36 search results - page 4 / 8
» A Robust Data Hiding Technique Using Multidimensional Lattic...
Sort
View
CCS
2009
ACM
14 years 1 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
ICASSP
2010
IEEE
13 years 4 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
SG
2007
Springer
14 years 21 days ago
Data-Embeddable Texture Synthesis
Abstract. Data hiding techniques onto images provide tools for protecting copyright or sending secret messages, and they are currently utilized as a simple input device of a cell p...
Hirofumi Otori, Shigeru Kuriyama
ICDE
2003
IEEE
146views Database» more  ICDE 2003»
14 years 8 months ago
Similarity Search in Sets and Categorical Data Using the Signature Tree
Data mining applications analyze large collections of set data and high dimensional categorical data. Search on these data types is not restricted to the classic problems of minin...
Nikos Mamoulis, David W. Cheung, Wang Lian
INTERSPEECH
2010
13 years 1 months ago
Learning a language model from continuous speech
This paper presents a new approach to language model construction, learning a language model not from text, but directly from continuous speech. A phoneme lattice is created using...
Graham Neubig, Masato Mimura, Shinsuke Mori, Tatsu...