Sciweavers

213 search results - page 2 / 43
» An LSB Data Hiding Technique Using Natural Numbers
Sort
View
ICIP
2005
IEEE
14 years 7 months ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
IJDE
2006
95views more  IJDE 2006»
13 years 5 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
PPOPP
2011
ACM
12 years 8 months ago
Compact data structure and scalable algorithms for the sparse grid technique
The sparse grid discretization technique enables a compressed representation of higher-dimensional functions. In its original form, it relies heavily on recursion and complex data...
Alin Florindor Murarasu, Josef Weidendorfer, Gerri...
WFLP
2009
Springer
277views Algorithms» more  WFLP 2009»
13 years 12 months ago
Termination of Context-Sensitive Rewriting with Built-In Numbers and Collection Data Structures
Context-sensitive rewriting is a restriction of rewriting that can be used to elegantly model declarative specification and programming languages such as Maude. Furthermore, it ca...
Stephan Falke, Deepak Kapur
BMCBI
2007
180views more  BMCBI 2007»
13 years 5 months ago
Using expression arrays for copy number detection: an example from E. coli
Background: The sequencing of many genomes and tiling arrays consisting of millions of DNA segments spanning entire genomes have made high-resolution copy number analysis possible...
Dmitriy Skvortsov, Diana Abdueva, Michael E. Stitz...