There are many detectors for simple Least Significant Bit (LSB) steganography in digital images, the most sensitive of which make use of structural or combinatorial properties of ...
In this paper we propose to use the technology of multiple correlation filters to address the issues involved in still-reference-to-video-sequence face verification. In particular,...
Chunyan Xie, B. V. K. Vijaya Kumar, S. Palanivel, ...
The “small world”-paradigm offers a new interesting viewpoint for the analysis of contemporary legal networks and artificial intelligence. This topological approach sheds fu...
Capability passing processes model global applications in a way that decouples the global agreement aspects of protocols from the details of how the communications are actually ma...
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...