Sciweavers

210 search results - page 15 / 42
» Research on Data Hiding Capacity
Sort
View
DASFAA
2009
IEEE
122views Database» more  DASFAA 2009»
14 years 1 months ago
Optimization on Data Object Compression and Replication in Wireless Multimedia Sensor Networks
Wireless Multimedia Sensor Networks (WMSNs) have brought unprecedented potentials for applications requiring ubiquitous access to multimedia contents such as still images. However,...
MingJian Tang, Jinli Cao, Xiaohua Jia, Ke-Yan Liu
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 10 months ago
Colour Guided Colour Image Steganography
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
MICRO
1997
IEEE
128views Hardware» more  MICRO 1997»
14 years 2 months ago
Run-Time Spatial Locality Detection and Optimization
As the disparity between processor and main memory performance grows, the number of execution cycles spent waiting for memory accesses to complete also increases. As a result, lat...
Teresa L. Johnson, Matthew C. Merten, Wen-mei W. H...
INFOCOM
1996
IEEE
14 years 2 months ago
Flow Labelled IP: A Connectionless Approach to ATM
A number of proposals for supporting IP over ATM are under discussion in the networking community including: LAN emulation, classical IP over ATM, routing over large clouds, and m...
Peter Newman, Thomas L. Lyon, Greg Minshall
EMNLP
2010
13 years 7 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark