The widespread availability of photo editing software has made it easy to create visually convincing digital image forgeries. To address this problem, there has been much recent w...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a novel steganographic approach using tri-way pixel-value dif...
Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, Te...
Superposition of radial basis functions centered at given prototype patterns constitutes one of the most suitable energy forms for gradient systems that perform nearest neighbor c...
Fingerprint matching is still a challenging problem for reliable person authentication because of the complex distortions involved in two impressions of the same finger. In this p...
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...