Sciweavers

211 search results - page 22 / 43
» Digital Evidence
Sort
View
IH
2005
Springer
14 years 2 months ago
A General Framework for Structural Steganalysis of LSB Replacement
There are many detectors for simple Least Significant Bit (LSB) steganography in digital images, the most sensitive of which make use of structural or combinatorial properties of ...
Andrew D. Ker
ICBA
2004
Springer
153views Biometrics» more  ICBA 2004»
14 years 2 months ago
A Still-to-Video Face Verification System Using Advanced Correlation Filters
In this paper we propose to use the technology of multiple correlation filters to address the issues involved in still-reference-to-video-sequence face verification. In particular,...
Chunyan Xie, B. V. K. Vijaya Kumar, S. Palanivel, ...
ICAIL
2007
ACM
13 years 10 months ago
P2P systems in legal networks: another "small world" case
The “small world”-paradigm offers a new interesting viewpoint for the analysis of contemporary legal networks and artificial intelligence. This topological approach sheds fu...
Ugo Pagallo, Giancarlo Ruffo
ENTCS
2006
127views more  ENTCS 2006»
13 years 8 months ago
Capability-Passing Processes
Capability passing processes model global applications in a way that decouples the global agreement aspects of protocols from the details of how the communications are actually ma...
Tom Chothia, Dominic Duggan
CORR
2004
Springer
80views Education» more  CORR 2004»
13 years 8 months ago
Notes On The Design Of An Internet Adversary
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...