Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
In the area of telerobotics, where remote systems are to be controlled, it is helpful to plan subsequent operations based on as much relevant data as possible. The simulation of t...
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Biometric authentication based on human physical traits has recently been heavily studied; these biometric sources include face, hand geometry, voice, fingerprint, iris, retina, et...
Vit Niennattrakul, Dachawut Wanichsan, Chotirat An...
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...