Sciweavers

3147 search results - page 14 / 630
» Statistically Hiding Sets
Sort
View
MMSEC
2005
ACM
274views Multimedia» more  MMSEC 2005»
14 years 1 months ago
LSB steganalysis based on high-order statistics
We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samp...
Sorina Dumitrescu, Xiaolin Wu
JMM2
2008
103views more  JMM2 2008»
13 years 7 months ago
A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing
To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a novel steganographic approach using tri-way pixel-value dif...
Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, Te...
IMC
2009
ACM
14 years 2 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
JOC
2010
82views more  JOC 2010»
13 years 2 months ago
A Verifiable Secret Shuffle of Homomorphic Encryptions
Abstract. A shuffle consists of a permutation and re-encryption of a set of input ciphertexts. One application of shuffles is to build mix-nets. We suggest an honest verifier zero-...
Jens Groth