Sciweavers

22 search results - page 3 / 5
» Searching for Hidden Messages: Automatic Detection of Stegan...
Sort
View
SSWMC
2004
13 years 6 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
IH
2005
Springer
13 years 10 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
ASPLOS
2006
ACM
13 years 11 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
TIP
2010
119views more  TIP 2010»
12 years 12 months ago
Trajectory Classification Using Switched Dynamical Hidden Markov Models
This paper proposes an approach for recognizing human activities (more specifically, pedestrian trajectories) in video sequences, in a surveillance context. A system for automatic ...
Jacinto C. Nascimento, Mário A. T. Figueire...
WACV
2012
IEEE
12 years 25 days ago
Dynamic and invisible messaging for visual MIMO
The growing ubiquity of cameras in hand-held devices and the prevalence of electronic displays in signage creates a novel framework for wireless communications. Traditionally, the...
Wenjia Yuan, Kristin J. Dana, Ashwin Ashok, Marco ...