Sciweavers

2827 search results - page 133 / 566
» Data Hiding in Video
Sort
View
VIIP
2001
15 years 5 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
CORR
2006
Springer
115views Education» more  CORR 2006»
15 years 4 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
SEMWEB
2009
Springer
15 years 9 months ago
Enrichment and Ranking of the YouTube Tag Space and Integration with the Linked Data Cloud
The increase of personal digital cameras with video functionality and video-enabled camera phones has increased the amount of user-generated videos on the Web. People are spending ...
Smitashree Choudhury, John G. Breslin, Alexandre P...
SOSP
2007
ACM
16 years 1 months ago
Sinfonia: a new paradigm for building scalable distributed systems
We propose a new paradigm for building scalable distributed systems. Our approach does not require dealing with message-passing protocols—a major complication in existing distri...
Marcos Kawazoe Aguilera, Arif Merchant, Mehul A. S...
ICIP
2002
IEEE
16 years 6 months ago
Analysis-by-synthesis dissolve detection
This paper presents a novel, real-time, minimal-latency technique for dissolve detection which handles the widely varying camera techniques, expertise, and overall video quality s...
Michele Covell, Subutai Ahmad