Sciweavers

909 search results - page 42 / 182
» Reversible data hiding
Sort
View
JDM
2008
112views more  JDM 2008»
13 years 9 months ago
Reverse Engineering from an XML Document into an Extended DTD Graph
The extensible markup language (XML) has become a standard for persistent storage and data interchange via the Internet due to its openness, self-descriptiveness, and flexibility....
Herbert Shiu, Joseph Fong
BIOCOMP
2008
13 years 11 months ago
Reverse Engineering Module Networks by PSO-RNN Hybrid Modeling
Background: Inferring a gene regulatory network (GRN) from high throughput biological data is often an under-determined problem and is a challenging task due to the following reas...
Yuji Zhang, Jianhua Xuan, Benildo de los Reyes, Ro...

Publication
295views
13 years 6 months ago
 Self-Authentication Of Natural Color Images In Pascal Transform Domain
This paper proposes a self-authentication scheme for color images, using a fragile data hiding method based on the Discrete Pascal Transform (DPT). The main contribution of this wo...
E. E. Varsaki, V. Fotopoulos and A. N. Skodras
APNOMS
2006
Springer
14 years 1 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
IAJIT
2010
162views more  IAJIT 2010»
13 years 8 months ago
Deriving Conceptual Schema from Domain Ontology: A Web Application Reverse Engineering Approach
: The heterogeneous and dynamic nature of components making up a web application, the lack of effective programming mechanisms for implementing basic software engineering principle...
Sidi Mohamed Benslimane, Mimoun Malki, Djelloul Bo...