Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
Abstract. Software engineering activities in the Industry has come a long way with various improvements brought in various stages of the software development life cycle. The comple...
R. Selvarani, T. R. Gopalakrishnan Nair, Muthu Ram...
In this paper we propose a novel data hiding procedure called Quantized Projection (QP), that combines elements from quantization (i.e. Quantization Index Modulation, QIM) and spr...
In this paper, we present a new technique for estimating an arbitrary skew angle using a simple and efficient text row accumulation based on the statistics of the 1st and 2nd orde...
Clinicians cannot easily visualize 3D intracerebral vascular anatomy in adequate detail. We present methods of creating a detailed, 3D vascular map from an MRA and a pair of x-ray ...
Elizabeth Bullitt, Alan Liu, Stephen R. Aylward, S...