Sciweavers

888 search results - page 86 / 178
» Digital detective - Bluetooth
Sort
View
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 4 months ago
E-Risk Management through Self Insurance: An Option Model
e-business organizations are under constant threat of their business being disrupted by hackers, viruses and a host of malicious attackers. This would lead to loses to the tune of...
Arunabha Mukhopadhyay, Binay Bhushan, Debashis Sah...
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 4 months ago
Hardware-Assisted Scanning for Signature Patterns in Image File Fragments
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is an important activity in the field of digital f...
Yoginder S. Dandass
SG
2007
Springer
14 years 4 months ago
Data-Embeddable Texture Synthesis
Abstract. Data hiding techniques onto images provide tools for protecting copyright or sending secret messages, and they are currently utilized as a simple input device of a cell p...
Hirofumi Otori, Shigeru Kuriyama
IH
2005
Springer
14 years 3 months ago
A General Framework for Structural Steganalysis of LSB Replacement
There are many detectors for simple Least Significant Bit (LSB) steganography in digital images, the most sensitive of which make use of structural or combinatorial properties of ...
Andrew D. Ker
ITC
2000
IEEE
93views Hardware» more  ITC 2000»
14 years 2 months ago
Stuck-fault tests vs. actual defects
This paper studies some manufacturing test data collected for an experimental digital IC. Test results for a large variety of single-stuck fault based test sets are shown and comp...
Edward J. McCluskey, Chao-Wen Tseng