Sciweavers

213 search results - page 28 / 43
» An LSB Data Hiding Technique Using Natural Numbers
Sort
View
BROADNETS
2006
IEEE
14 years 4 months ago
A Statistical Approach to Anomaly Detection in Interdomain Routing
Abstract— A number of events such as hurricanes, earthquakes, power outages can cause large-scale failures in the Internet. These in turn cause anomalies in the interdomain routi...
Shivani Deshpande, Marina Thottan, Tin Kam Ho, Bip...
IH
2005
Springer
14 years 3 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
ICCAD
1994
IEEE
105views Hardware» more  ICCAD 1994»
14 years 2 months ago
Register assignment through resource classification for ASIP microcode generation
Application Specific Instruction-Set Processors (ASIPs) offer designers the ability for high-speed data and control processing with the added flexibility needed for late design sp...
Clifford Liem, Trevor C. May, Pierre G. Paulin
TIP
2008
261views more  TIP 2008»
13 years 10 months ago
CTex - An Adaptive Unsupervised Segmentation Algorithm Based on Color-Texture Coherence
Abstract--This paper presents the development of an unsupervised image segmentation framework (referred to as CTex) that is based on the adaptive inclusion of color and texture in ...
Dana Elena Ilea, Paul F. Whelan
CSE
2009
IEEE
14 years 5 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...