Sciweavers

IEEEIAS
2007
IEEE
14 years 6 months ago
Generative Models for Fingerprint Individuality using Ridge Types
Generative models of pattern individuality attempt to represent the distribution of observed quantitative features, e.g., by learning parameters from a database, and then use such...
Gang Fang, Sargur N. Srihari, Harish Srinivasan
IEEEIAS
2007
IEEE
14 years 6 months ago
An LSB Data Hiding Technique Using Prime Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically m...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
IEEEIAS
2007
IEEE
14 years 6 months ago
Information-theoretical comparison of likelihood ratio methods of forensic evidence evaluation
Forensic evidence in the form of two-level hierarchical multivariate continuous data is modelled using a likelihood ratio approach. Data are available from fragments of glass and ...
Daniel Ramos, Joaquin Gonzalez-Rodriguez, Grzegorz...
IEEEIAS
2007
IEEE
14 years 6 months ago
A Weighted Stego Image Detector for Sequential LSB Replacement
We describe a simple modification of the so-called Weighted Stego Image (WS) steganalysis method, due to Fridrich and Goljan, to detect sequential replacement of least significa...
Andrew D. Ker
IEEEIAS
2007
IEEE
14 years 6 months ago
Modeling Security Protocols as Games
We model security protocols as a game tree using concepts of game semantics. The model interprets protocol specifications as strategies over a game tree that represents the type ...
Mohamed Saleh, Mourad Debbabi
IEEEIAS
2007
IEEE
14 years 6 months ago
Organized Anonymous Agents
Martijn Warnier, Frances M. T. Brazier
IEEEIAS
2007
IEEE
14 years 6 months ago
Analysing the Security Threats against Network Convergence Architectures
Patroklos G. Argyroudis, Robert McAdoo, Stephen To...
IEEEIAS
2007
IEEE
14 years 6 months ago
Computational Forensics: Towards Hybrid-Intelligent Crime Investigation
In recent years, mathematical, statistical and computer science methods have found extensive application in developing new procedures for crime investigation, prosecution and the ...
Katrin Franke, Sargur N. Srihari
IEEEIAS
2007
IEEE
14 years 6 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei
IEEEIAS
2007
IEEE
14 years 6 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin