The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and effic...
Adel Almohammad, Gheorghita Ghinea, Robert M. Hier...
This paper proposes a fast AND/OR tree search algorithm using a multiple-paths concurrent search method. Conventional heuristic AND/OR tree search algorithms expand nodes in only ...
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
Recent findings have shown that humans can adapt their internal control model to account for the changing dynamics of systems they manipulate. In this paper, we explore the effect...
Ali Israr, Hakan Kapson, Volkan Patoglu, Marcia Ki...
In order to increase a user’s sense of presence in an artificial environment some researchers propose a gradual transition from reality to the virtual world instead of immersin...
Frank Steinicke, Gerd Bruder, Klaus Hinrichs, Anth...