A Robust Webpage Information Hiding Method Based on the Slash of Tag
|
|
- Quentin Richards
- 5 years ago
- Views:
Transcription
1 Advanced Engneerng Forum Onlne: ISSN: X, Vols. 6-7, pp do: / Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based on the Slash of Tag Yujun Yang 1,2,a, Yme Yang 1,b 1 Department of Computer Scence and Technology, Huahua Unversty, Huahua, , Chna 2 School of Computer Scence and Engneerng, Unversty of Electronc Scence and Technology, Chengdu, , Chna a mlsoft163@163.com, b yym1630@163.com Keywords: Slash; Informaton Hdng; Tag Attrbute; Webpage. Abstract. Nowadays,the nformaton hdng technology s a hot spot n the feld of nformaton securty, and s appled n many felds,such as dgtal multmeda copyrght protecton and secret communcaton. Accordng to the analyss of the characterstcs of browser n parsng HTML of the webpage and the lttle capacty avalable for nformaton hded n webpage, a new robust webpage nformaton hdng method wth the slash of tag attrbutes has been proposed n ths paper, whch overcomes the shortcomng of the ablty of mperceptblty and the ablty of contradct wth the machne fltraton of tradtonal webpage nformaton hdng algorthms and has greater embedded capacty than some other algorthm based on tag attrbutes. Ths method has good performances n nvsblty and hgher appled value as proved by the experments. Introducton Informaton hdng[1] s to hde some secret nformaton n nnocuous-lookng cover objects, such as audos, mages, vdeos, texts, etc.. In recent years, Informaton hdng has generated sgnfcant research and commercal nterest. The prmary factors contrbutng to ths surge are wdespread use of the Internet wth mproved bandwdth and speed, regonal copyrght loopholes n terms of legslaton; and seamless dstrbuton of multmeda content due to peer-to-peer fle-sharng applcatons. HTML s a hypertext markup language for wrtng hypertext fles, namely webpages, whch are used to convey nformaton through the Internet. Wth the development of the Internet as a man communcatve means, webpages have enjoyed an extensve applcaton n the Internet. Meanwhle, a wde varety of steganographc methods[2-4] for webpages have emerged. Accordng to the analyss of the characterstcs of browser n parsng HTML of the webpage, the source codes of a webpage are a plan text that contans small markup tags, by whch the web browser s nstructed how to dsplay the page. Informaton hdng based on webpage uses a webpage as a cover, and then embeds some secret nformaton nto the source codes of the webpage, whle the dsplayng effect wll reman unchanged. Through analyzng the crteron of HTML and References [2-5], we have defned three man nformaton hdng methods: 1) Based on the nvsble characters embeddng; 2) Based on the changng of letter upper and lower cases n tags; 3) Based on the changng the order of attrbute tags par. The frst two methods are nformaton hdng methods based on document format. The method of embeddng nvsble characters s to embed extra nvsble characters between tags, or after every row, or after the whole document, to encode secret nformaton. The second method s based on the fact that letters n tags are always case-nsenstve, therefore the cases of tag letters can be modfed wthout changng the vsble document or the fle sze. So, defne the uppercase letter as the bt 0 and the lowercase letter as 1, secret nformaton can be embedded nto a webpage by changng of the letters upper and lower cases n tags. A new robust webpage nformaton hdng method wth the slash of tag attrbutes has been proposed n ths paper, whch overcomes the shortcomng of the ablty of mperceptblty and the ablty of contradct wth the machne fltraton of tradtonal webpage nformaton hdng Ths s an open access artcle under the CC-BY 4.0 lcense (
2 362 Informaton Technology for Manufacturng Systems III algorthms and mproves the embedded capacty of the other algorthm based on tag attrbutes. Accordng to the embedded rule, frstly the sequenced tags entty set s acqured from the webpage. Then the message s encrypted by a two-value chaotc sequence generated by Logstc map system. The value format of a certan attrbute n tags s selected and a modfcaton s made to them based on the encrypted message, whch s whether t has sngle quotaton mark. The analyss shows that the method has good mperceptblty and perfect securty than the tradtonal method. And the embedded capacty of the method gets better ncrease than the method based on the attrbutes of tags. So the method could be used to protect the content of a webpage and covert communcaton. The Method The Proposed Scheme. In ths secton, we wll present the proposed nformaton hdng scheme based on the slash of webpage tags. The process dagram of the scheme, whch s composed of the nformaton embeddng process and the nformaton extracton process, s shown n Fg. 1. The embeddng process s used to hde the secret data n the cover webpage, whle the extracton process s used to extract the secret data from the hdden webpage. Server Sde Cover Webpage Secret Data Preprocess Hdden Webpage Embeddng Process Embeddng Internet Extracton Process Secret Data Inverse process Hdden Webpage Clent Sde Extractng Fg 1. The Process Dagram of the Proposed Scheme The Related Theoretcs. Defnton 1. Let T=<a 1, a 2,, a n > be a tag wth n attrbutes n HTML, where T s the name of the tag and a (1 n), whose general form s attrbute name=attrbute value (short for name=value), s the -th attrbute of the tag. And let Ts be a sngle tag wthout end tags n HTML, meanwhle let Td be a double tag wth startng and endng Tags. The startng component of any tag s the tag name and ts attrbutes, f any. The correspondng endng tag s the tag name alone, preceded by a slash (/). Endng tags have no attrbutes. Defnton 2. Let W be number of webpage tags, where W s a webpage. And let T be a number of attrbutes of the -th webpage tag, where T s the -th tag n the webpage. Defnton 3. Let O be a object that s composed of a attrbute and a value of the attrbute n a tag, where O s the -th object n the tag. For example, the sze=21px s O 1 and the color=green s O 2 n the tag <font sze=21px color=green>. Defnton 4. Let T and T be a par of equal tag object, where T s a tag object wthout slash marks, T s a tag object wth a slash marks. For example, the T s <font sze=5 >, the T s <font sze=5 />. That s T T. By studyng thoroughly, we found that the vew results do not occur any change between the orgnal webpages and the modfed webpages usng the equal attrbute object n the browser. Property 1. Equal attrbute object has the dentcal functon.
3 Advanced Engneerng Forum Vols Rule 1. Embedded decson rule. If a tag object T s a Ts tag or the startng component of any Td tag such that the <br> tag s a Ts tag and the <font sze=4> tag s the startng component of Td tag <font sze=4> </font>, the T meets the nserton requrement; Otherwse, the T does not meet the nserton requrement. Rule 2. Extracton decson rule. If a tag object T wth the slash marks s a Ts tag or the startng component wth the slash marks of any Td tag such that the <br /> tag s a Ts tag and the <font sze=4 /> tag s the startng component of Td tag <font sze=4> </font>,, the T meets the extracton requrement; Otherwse, the T does not meet the extracton requrement. Rule 3. Embedded rule. W Step 1: Let = 1, where 1 T k k 1 Step 2: If the T meets the nserton requrement of Rule 1, then go to Step 4. Step 3: Let = + 1. If the W, then go to Step 2. Otherwse, go to Step 5. ' Step 4: The T s modfed to the T, and let = + 1.If the W, then go to Step 2. Step 5: Fnshed. Rule 4. Extracton rule. Step 1: Let = 1, where 1 W T k k 1 Step 2: If the T meets the extracton requrement of Rule 2, then go to Step 4. Step 3: Let = + 1. If the W, then go to Step 2. Otherwse, go to Step 5. Step 4: We extract a secret nformaton bt, and let = + 1.If the W, then go to Step 2. Step 5: Fnshed. The Hdng Process. Let W={ T 1, T 2,, T n } be a cover webpage, where T s a tag n the webpage. And let M={ m 1, m 2,, m n } be the secret data bts to be embedded n the cover webpage. In order to ncrease the secrecy of the proposed scheme, we generate a chaotc sequence L={ l 1, l 2,, l n }, accompaned by a secret key to manpulate t, by the Logstc map system. Then the secret data bts s calculated by usng the Eq.1. S=M L={ s 1, s 2,, s n }={ m 1 l 1, m 2 l 2,, m n l n } (1) We use the S={ s 1, s 2,, s n } to determne whether the tag can be used to hde nformaton or not accordng to the Rule 3. The hdng process can be descrbed as follows: Step 1: Calculate the M form the secret data and generate the L by the Logstc map system and the secret key K, then Calculate the S from the M and the L. Step 2: Accordng to the Rule 1, check every tag object T of the webpage to determne whether the tag object T can be used to hde nformaton or not. In our new method, f there s a equal tag object T n the tag T, then the tag T s called embeddable tag. ' Step 3: For the embeddable tag object, f the secret data bt of the S s 1, then replace the T wth the T for nformaton hdng accordng to the value of the secret date bt. Otherwse, f the secret data bt s 0, the scheme retans the orgnal tag object. The payload capacty of the proposed scheme s gven by Eq.2 W Capa = T k (2) The Extracton Process. In ths subsecton, we shall descrbe the extracton process. The followng extracton procedure s used to extract the embedded secret data. The extracton process can be descrbed as follows: Step 1: Accordng to the Rule 2, check every tag object T of the webpage to determne whether the tag object T has been used to hde nformaton or not. In our new method, f there exsts the tag object T, then the hdden secret data bt s s 1; otherwse, the hdden secret bt s s 0. ' k 1
4 364 Informaton Technology for Manufacturng Systems III Step 2: Snce the recever owns the secret key used to generate the chaotc sequence L by the Logstc map system, the orgnal secret data can be calculated by usng the Eq.3. M=S L={m 1, m 2,, m n }={ s 1 l 1, s 2 l 2,, s n l n } (3) The Experments The experments were carred out to evaluate the performance of the proposed nformaton hdng scheme based on the slashs of tag n the webpage. The proposed scheme was tested on Wn 7 personal computer wth a Pentum IV 2.66GHz and 4G RAM. And sx homepages of pop webste were used as the cover webpage. The Expermental Results. We have mplemented the proposed nformaton hdng method n the Vsual C envronment. The experment result shows that the vew results dd not occur any change between the orgnal webpages and the modfed webpages usng the equvalent tag object n the browser. Fg. 2 and Fg.3 show the embedded secret data before and after webpage renderngs. Fg. 4 and Fg. 5 show the source screenshots of the embedded secret data before and after webpage. Fg. 2. The WebPage Renderng Before Embedded Secret Data Fg. 3. The WebPage Renderng After Embedded Secret Data Fg. 4. The Source Screenshot Before Embedded Secret Data Fg. 5. The Source Screenshot After Embedded Secret Data At the same tme, the homepage on the popular webste has been tested for the maxmum hdden amount of webpage. Table 1 shows the largest embedded capacty, whch s called LEC for short, of the homepages on some popular webstes whch were vsted on June 5, And the expermental results show that the method has good mperceptblty and perfect securty than the method whch was proposed n [6].
5 Advanced Engneerng Forum Vols Table 1 The LEC of Homepages on Some Popular Webstes Homepage of Webste LEC(b) of our method Method LEC(b) of method n [6] LEC(b) of method n [7] The Performance Evaluaton. Table 2 shows the performance parameters of our method and other sx algorthms whch are the nvsble character, the changng uppercase and lowercase of tag, the order of attrbutes par, the equal tag dsplacement and the repeat attrbute of the tag algorthm. The nvsble character method whch do not effect the normal show hde the secret nformaton by addng spaces and tabs on the end of the lne, but those who do not see characters at a glance when the source code of the hdden nformaton page were selected smply. The changng uppercase and lowercase of tag method whch do not effect the normal show too hde the secret nformaton by usng the tags characterstcs of case-nsenstve n the HTML norms, however the artfcal alter of the tags s very easy found by observng the source code of the hdden secret nformaton webpages, and then the hdden message was exposed. The changng order of attrbutes par method whch has strong ant-testng capablty hde the secret data by changng the order of attrbutes par n the webpage, but the extractng secret data needs the orgnal database whch generates addtonal transmsson at the tme of transportng. The equal tag dsplacement method n [6] whch has strong ant-testng capablty do not change the orgnal fle sze after hdng secret nformaton. Even vewng the page s source code can not determne whether hdden secret nformaton n the webpage. But we can not hde any nformaton n the page whle all tags of page have one attrbute at most. The equal tag attrbutes method n [7] do not almost change the orgnal fle sze after hdng secret nformaton,and the equal tag attrbutes s not easy found by observng the source code of the hdden secret nformaton webpages, but t has not strong ant-testng capablty and the hdden secret nformaton was not extracted correctly, f someone changed the order of the equal tag attrbutes. The repeat attrbute of tag method n [8] changes the fle sze on bgger degree and the repeat attrbutes of the tag s very easy found by observng the source code of the hdden secret nformaton webpages, and then the hdden secret nformaton was exposed. Our method does not change the dsplay of the content and appearance of webpages after hdng secret nformaton. The hdden secret nformaton was not found by vewng the source code of the webpage. And then anyone can't change the order of the equal tag or else the webpage was not dsplay properly. Accordng to the above experment result, our method has strong ant-testng capablty, strong securty capablty, strong robustness capablty, good mperceptblty and larger embedded capacty than other methods, such as the equal tag dsplacement method n [6] and the equal tag attrbutes method n [7]. Method Table 2 Performance Parameters of Fve Algorthms Imperceptblty Robustness Parameter Change Fle Sze Aganst of Detecton Securty Invsble Character Good Weak Yes Weak Weak Changng Case of Tag Good Weak No Weak Weak Order of Attrbutes Par Good Strong No Strong Strong Equal Tag Dsplacement n [6] Good Strong No Strong Strong Equal tag Attrbute Dsplacement n [7] Good Strong Yes Strong Strong Repeat Attrbute of Tag n [8] Good Strong Yes Strong Strong Our Method Good Strong Yes Strong Stronger
6 366 Informaton Technology for Manufacturng Systems III Conclusons and future works Informaton hdng technology s a hot spot n nformaton securty, and s appled n the felds of dgtal multmeda copyrght protecton and secret communcaton. Accordng to the analyss of the characterstcs of browser n parsng HTML of the webpage and the lttle capacty avalable for nformaton hded n webpage, a new effcent webpage nformaton hdng method wth equal tag has been proposed n ths paper, whch overcomes the shortcomng of the ablty of mperceptblty and the ablty of contradct wth the machne fltraton of tradtonal webpage nformaton hdng algorthms and mproves the embedded capacty of the other algorthm based on tag attrbutes. Ths method has good performances n nvsblty and hgher appled value as proved by the experments. So we conclude that the proposed method s practcal n many real applcatons. The next work s to study how to mproves the embedded capacty and securty capablty of the method by usng the relatve lnks of the webpages and mult-webpage embedment technology or other ones. Acknowledgment Ths work s supported by the Constructng Program of the Key Dscplne n Huahua Unversty, by Scentfc Research Fund of Hunan Provncal Educaton and by Scentfc Research Fund of Huahua Unversty(HHUY , ). References [1] F. A. P. Pettcolas, R. J. Anderson, M. G. Kuhn, Informaton hdng-a survey, Proceedngs of the IEEE, vol.3, 1999, pp [2] C. John, Hdng Bnary Data n HTML Documents, steganodotnet13.asp, [3] Q. J. Zhao, H. T. Lu, A PCA-based Watermarkng Scheme for Tamper-proof of Web pages, Pattern Recognton, Elsever Scence, Oxford, ROYAUMEUNI, 2005, vol.38, no.8,pp [4] Q. J. Zhao, H. T. Lu, X. H. Jang, Web page Watermarkng for Tamper-proof, Journal of Shangha Jaotong Unversty(Scence), Chna, 2005, vol. 3, no.e-10,pp [5] L. Hu, X. G. You, Analyss of HTML nformaton hdng technology, In Proc of CIHW2001, X an: Xdan Unversty Press, 2001, pp [6] X. M. Sun, H. J. Huang, B. W. Wang, G. Sun, J. W. Huang, An Algorthm of Webpage Informaton Hdng Based on Equal Tag, Journal of Computer Research and Development, 2007,vol.44,no.5,pp [7] Y. J. Yang, Y. M. Yang, An Effcent Webpage Informaton Hdng Method Based on Tag Attrbutes, Fuzzy Systems and Knowledge Dscovery, 2010 Seventh Internatonal Conference on,2010,vol.3,no.7,pp [8] J. G. L, X.H. Ma, X. F. Shen, A Novel Scheme of Multple Webpages Informaton Hdng Based on Repeatng Tag Attrbutes, Computer Applcatons and Software, 2009, vol.26, no.8, pp
Research of Multiple Text Watermarks Technique in Electric Power System Texts
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationKey-Selective Patchwork Method for Audio Watermarking
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationHybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationResearch Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationArticle Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique
Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationIdentify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity
Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationRobust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation
JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationSemi-Fragile Watermarking Scheme for Authentication of JPEG Images
Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationA NEW AUDIO WATERMARKING METHOD BASED
A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationA Clustering Algorithm for Key Frame Extraction Based on Density Peak
Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationUsing Counter-propagation Neural Network for Digital Audio Watermarking
Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationRobust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion
Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationA fast algorithm for color image segmentation
Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au
More informationRobust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT
Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationAudio Content Classification Method Research Based on Two-step Strategy
(IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng
More informationA Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model
A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com
More informationRobust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information
Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate
More informationInformation Hiding Watermarking Detection Technique by PSNR and RGB Intensity
www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,
More informationData Hiding and Image Authentication for Color-Palette Images
Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationPerformance Analysis of Data Hiding in MPEG-4 AAC Audio *
TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun
More informationEYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS
P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationA Frame Packing Mechanism Using PDO Communication Service within CANopen
28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The
More informationAn efficient method to build panoramic image mosaics
An effcent method to buld panoramc mage mosacs Pattern Recognton Letters vol. 4 003 Dae-Hyun Km Yong-In Yoon Jong-Soo Cho School of Electrcal Engneerng and Computer Scence Kyungpook Natonal Unv. Abstract
More informationReversible Dual-Image-Based Hiding Scheme Using Block Folding Technique
S S symmetry Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu Tzu-Chuen Lu 1, 1, * and Hu-Shh Leng * ID and Hu-Shh Leng 1 Department Informaton Management, Chaoyang
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationA CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION
A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION 1 FENG YONG, DANG XIAO-WAN, 3 XU HONG-YAN School of Informaton, Laonng Unversty, Shenyang Laonng E-mal: 1 fyxuhy@163.com, dangxaowan@163.com, 3 xuhongyan_lndx@163.com
More informationDetecting MP3Stego using Calibrated Side Information Features
2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com
More informationAnalysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD
Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationA Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures
A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationFinite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c
Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationHarvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)
Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationUB at GeoCLEF Department of Geography Abstract
UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department
More informationReliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm
Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng
More informationFuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval
Fuzzy -Means Intalzed by Fxed Threshold lusterng for Improvng Image Retreval NAWARA HANSIRI, SIRIPORN SUPRATID,HOM KIMPAN 3 Faculty of Informaton Technology Rangst Unversty Muang-Ake, Paholyotn Road, Patumtan,
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationRobust visual tracking based on Informative random fern
5th Internatonal Conference on Computer Scences and Automaton Engneerng (ICCSAE 205) Robust vsual trackng based on Informatve random fern Hao Dong, a, Ru Wang, b School of Instrumentaton Scence and Opto-electroncs
More informationTHE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY
Proceedngs of the 20 Internatonal Conference on Machne Learnng and Cybernetcs, Guln, 0-3 July, 20 THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY JUN-HAI ZHAI, NA LI, MENG-YAO
More informationIAJIT First Online Publication
Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationAdvanced Computer Networks
Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans
More informationAdaptive digital watermarking of images using Genetic Algorithm
Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationTECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France
20th European Sgnal Processng Conference (EUSIPCO 2012) Bucharest, Romana, August 27-31, 2012 TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) Sarra Kouder 2, Marc Chaumont 1,2, Wllam Puech
More informationA NOTE ON FUZZY CLOSURE OF A FUZZY SET
(JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,
More informationPCA Based Gait Segmentation
Honggu L, Cupng Sh & Xngguo L PCA Based Gat Segmentaton PCA Based Gat Segmentaton Honggu L, Cupng Sh, and Xngguo L 2 Electronc Department, Physcs College, Yangzhou Unversty, 225002 Yangzhou, Chna 2 Department
More informationA XML-Based Composition Event Approach as an Integration and Cooperation Middleware
A XML-Based Composton Event Approach as an Integraton and Cooperaton Mddleware Gang Xu, JanGang Ma, and Tao Huang Technology Center of Software Engneerng, Insttute of Software, Chnese Academy of Scences,
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationCorner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity
Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationModular PCA Face Recognition Based on Weighted Average
odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationChinese Word Segmentation based on the Improved Particle Swarm Optimization Neural Networks
Chnese Word Segmentaton based on the Improved Partcle Swarm Optmzaton Neural Networks Ja He Computatonal Intellgence Laboratory School of Computer Scence and Engneerng, UESTC Chengdu, Chna Department of
More informationImage Emotional Semantic Retrieval Based on ELM
Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 2014) Image Emotonal Semantc Retreval Based on ELM Pele Zhang, Mn Yao, Shenzhang La College of computer scence & Technology
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationStatistical Steganalyis of Images Using Open Source Software
Statstcal Steganalys of Images Usng Open Source Software Bhargav Kapa, Stefan A. Robla Department of Computer Scence Montclar State Unversty Montclar, NJ 07043 roblas@mal.montclar.edu Abstract In ths paper
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationA new segmentation algorithm for medical volume image based on K-means clustering
Avalable onlne www.jocpr.com Journal of Chemcal and harmaceutcal Research, 2013, 5(12):113-117 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCRC5 A new segmentaton algorthm for medcal volume mage based
More informationRobust Shot Boundary Detection from Video Using Dynamic Texture
Sensors & Transducers 204 by IFSA Publshng, S. L. http://www.sensorsportal.com Robust Shot Boundary Detecton from Vdeo Usng Dynamc Teture, 3 Peng Tale, 2 Zhang Wenjun School of Communcaton & Informaton
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationFuzzy Modeling of the Complexity vs. Accuracy Trade-off in a Sequential Two-Stage Multi-Classifier System
Fuzzy Modelng of the Complexty vs. Accuracy Trade-off n a Sequental Two-Stage Mult-Classfer System MARK LAST 1 Department of Informaton Systems Engneerng Ben-Guron Unversty of the Negev Beer-Sheva 84105
More informationResearch Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion
Securty and Communcaton Networks Volume 2018, Artcle ID 1326235, 9 pages https://do.org/10.1155/2018/1326235 Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng
More informationmquest Quickstart Version 11.0
mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce
More informationReal-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems
Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,
More information