Sciweavers

909 search results - page 101 / 182
» Reversible data hiding
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
BMCBI
2005
142views more  BMCBI 2005»
14 years 9 months ago
CLU: A new algorithm for EST clustering
Background: The continuous flow of EST data remains one of the richest sources for discoveries in modern biology. The first step in EST data mining is usually associated with EST ...
Andrey A. Ptitsyn, Winston Hide
MVA
1998
117views Computer Vision» more  MVA 1998»
14 years 9 months ago
A system for a new two-dimensional code: Secure 2D code
Abstract. A new 2D code called Secure 2D code is designed in this paper, both encoder and decoder are also proposed. Secure 2D code can store any kind of data and provides high sec...
Chung-Tsai Yeh, Ling-Hwei Chen
MEDIAFORENSICS
2010
14 years 8 months ago
On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations
A number of methods have been proposed over the last decade for embedding information within deoxyribonucleic acid (DNA). Since a DNA sequence is conceptually equivalent to a unid...
Félix Balado
CCS
2007
ACM
15 years 4 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...