We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
—Distributed transmit beamforming has recently been proposed as a technique in which several single-antenna sources cooperate to form a virtual antenna array and simultaneously t...
Academic institutions’ dependence on web-based technologies to improve efficiency in class offerings, academic records, and office documentation is increasing at a rapid pace. T...