This paper analyzes the performance of an energy detector over wireless channels with composite multipath fading and shadowing effects. These effects are modeled by using the and ...
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...
Performances evaluation of image processing intermediate results in video based surveillance systems is extremely important due to the variety of approaches to this task. In this ...
Franco Oberti, Andrea Teschioni, Carlo S. Regazzon...
It is well-known that linguistic decision-making problems that manage preferences from different experts follow a common resolution scheme composed by two phases: an aggregation p...
We examine diffusion properties of Rijndael which has been selected by US National Institute of Standards and Technology (NIST) for the proposed Advanced Encryption Standard (AES)....