Sciweavers

18374 search results - page 59 / 3675
» Applications for data hiding
Sort
View
IJDE
2006
95views more  IJDE 2006»
13 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
DSN
2005
IEEE
14 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
HASE
1999
IEEE
14 years 2 months ago
Automatic Dependability Analysis for Supporting Design Decisions in UML
Even though a thorough system specification improves the quality of the design , it is not sufficient to guarantee that a system will satisfy its reliability targets. Within this ...
Andrea Bondavalli, Ivan Mura, István Majzik
COMCOM
2004
148views more  COMCOM 2004»
13 years 9 months ago
Hierarchical analysis of RealMedia streaming traffic on an IEEE 802.11b wireless LAN
The popularity of multimedia streaming on the Internet, combined with the growing deployment of wireless access networks, augurs the converging usage of these two technologies in ...
Tianbo Kuang, Carey L. Williamson
ICIP
2007
IEEE
14 years 11 months ago
Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation
We present a method to compute the steganographic capacity for images, with odd-even based hiding in the quantized discrete cosine transform domain. The method has been generalize...
Anindya Sarkar, B. S. Manjunath