Sciweavers

2259 search results - page 67 / 452
» Separation and information hiding
Sort
View
ICDS
2010
IEEE
14 years 3 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
NLDB
2004
Springer
14 years 2 months ago
Synonymous Paraphrasing Using WordNet and Internet
We propose a method of synonymous paraphrasing of a text based on WordNet synonymy data and Internet statistics of stable word combinations (collocations). Given a text, we look fo...
Igor A. Bolshakov, Alexander F. Gelbukh
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 9 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
ECAL
2007
Springer
14 years 3 months ago
Emergence of Genetic Coding: An Information-Theoretic Model
This paper1 introduces a simple model for evolutionary dynamics approaching the “coding threshold”, where the capacity to symbolically represent nucleic acid sequences emerges ...
Piraveenan Mahendra, Daniel Polani, Mikhail Prokop...
ICIP
2009
IEEE
14 years 10 months ago
Combining Multimodal And Temporal Contextual Information For Semantic Video Analysis
In this paper, a graphical modeling-based approach to semantic video analysis is presented for jointly realizing modality fusion and temporal context exploitation. Overall, the ex...