Image steganalysis so far has dealt only with detection of a hidden message and estimation of some of its parameters (e.g., message length and secret key). To our knowledge, so fa...
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
A computational model is presented for the detection of coherent motion based on template matching and hidden Markov models. The premise of this approach is that the growth in dete...
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...