In this paper we analyze a new class of pulsing denialof-service (PDoS) attacks that could seriously degrade the throughput of TCP flows. During a PDoS attack, periodic pulses of...
Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology t...
Abstract— Recently, we have implemented a computervision based horizon-tracking algorithm for flight stability and autonomy in Micro Air Vehicles (MAVs) [1]. Occasionally, this ...
Sinisa Todorovic, Michael C. Nechyba, Peter G. Ifj...
For the improvement of iris recognition system performance, the filtering algorithm that picks out counterfeit and noisy data is very important. In this paper, as a part of preproc...
In this paper, we develop a robust image data hiding scheme based on multiple description coding of the signature image. At the transmitter, the signature image is encoded by balan...