Sciweavers

2259 search results - page 74 / 452
» Separation and information hiding
Sort
View
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 9 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
IDA
2009
Springer
13 years 6 months ago
A Cascade System for Solving Permutation and Gain Problems in Frequency-Domain BSS
Abstract. This paper presents a novel technique for separating convolutive mixtures of statistically independent non-Gaussian signals. The time-domain convolution is transformed in...
Daniel I. Iglesia, Héctor J. Pérez-I...
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
14 years 3 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.
MMSEC
2005
ACM
274views Multimedia» more  MMSEC 2005»
14 years 2 months ago
LSB steganalysis based on high-order statistics
We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samp...
Sorina Dumitrescu, Xiaolin Wu
IH
2005
Springer
14 years 2 months ago
Translation-Based Steganography
This paper investigates the possibilities of steganographically embedding information in the \noise" created by automatic translation of natural language documents. Because th...
Christian Grothoff, Krista Grothoff, Ludmila Alkhu...