For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically m...
A growing number of databases especially those published on the Web are becoming available to external users. Users of these databases are provided simple form-based query interfa...
Information theoretic tools lead to the design and analysis of new blind data hiding methods. A novel quantizationbased blind method, which uses trellis coded quantization, is pro...
Given the high cost of producing software, development of technology for prevention of software piracy is important for the software industry. In this paper we present a novel app...