Sciweavers

650 search results - page 109 / 130
» Distorting symmetric designs
Sort
View
ICASSP
2010
IEEE
13 years 7 months ago
Anti-forensics of JPEG compression
The widespread availability of photo editing software has made it easy to create visually convincing digital image forgeries. To address this problem, there has been much recent w...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
JMM2
2008
103views more  JMM2 2008»
13 years 7 months ago
A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing
To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a novel steganographic approach using tri-way pixel-value dif...
Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, Te...
PR
2006
112views more  PR 2006»
13 years 7 months ago
RBF-based neurodynamic nearest neighbor classification in real pattern space
Superposition of radial basis functions centered at given prototype patterns constitutes one of the most suitable energy forms for gradient systems that perform nearest neighbor c...
Mehmet Kerem Müezzinoglu, Jacek M. Zurada
PR
2006
119views more  PR 2006»
13 years 7 months ago
Fingerprint matching by genetic algorithms
Fingerprint matching is still a challenging problem for reliable person authentication because of the complex distortions involved in two impressions of the same finger. In this p...
Xuejun Tan, Bir Bhanu
JCP
2007
127views more  JCP 2007»
13 years 7 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong