One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Abstract. This paper presents a novel technique for separating convolutive mixtures of statistically independent non-Gaussian signals. The time-domain convolution is transformed in...
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samp...
This paper investigates the possibilities of steganographically embedding information in the \noise" created by automatic translation of natural language documents. Because th...
Christian Grothoff, Krista Grothoff, Ludmila Alkhu...