Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








30 Hits in 8.5 sec

Controversial "Pixel" Prior Rule for JPEG Adaptive Steganography

Weiming Zhang, Wenbo Zhou, Weixiang Li, Kejiang Chen, Hang Zhou, Nenghai Yu
2018 IET Image Processing  
Currently, the most successful model for image adaptive steganography is the framework of minimal distortion, in which a reasonable definition of costs can improve the security level.  ...  In the authors' previous work, they developed a rule for cost reassignment in spatial domain called the 'controversial pixel prior (CPP)' rule, which defines controversial pixels by utilizing the controversies  ...  On the basis of this discovery, we proposed CPP rule for cost reassignment in spatial steganography. The CPP rule focuses on those controversial pixels and gives them priority of modification.  ... 
doi:10.1049/iet-ipr.2018.5401 fatcat:x26wdiz52rfqln3morjtcnzxqi

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection

Luca Caviglione, Michal Choras, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, Katarzyna Wasielewska
2020 IEEE Access  
At present, the complexity, proliferation, and variety of malware pose a real challenge for the existing countermeasures and require their constant improvements.  ...  It allows using the victim's machine for various nefarious purposes, e.g., making it a part of the botnet, mining cryptocurrencies, or holding hostage the data stored there.  ...  Unfortunately, malware also rapidly adapts to new devices and environments.  ... 
doi:10.1109/access.2020.3048319 fatcat:tatdk6pzczgp3aylvbxoxabuta

"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading

Panlong Yang, Qingyu Li, Yubo Yan, Xiang-Yang Li, Yan Xiong, Baowei Wang, Xingming Sun
2016 IEEE Transactions on Vehicular Technology  
Nevertheless, it would bring fundamental challenges to task reassignment in the following aspects: First of all, some of the friendships are relatively stable, which would lead to a more imbalanced task  ...  In summary, ours could effectively explore the social relationship and leverage it for efficient task assignment, which would further encourage more mobile users to work together under the rule of social  ...  We propose a new concept for balanced task offloading algorithm design, that is, 'Your friends are more powerful than you.'  ... 
doi:10.1109/tvt.2015.2465392 fatcat:hd3iw6t3lzhyfkw346r7gjhdvu

Cybersecurity: Past, Present and Future [article]

Shahid Alam
2023 arXiv   pre-print
The digital transformation has created a new digital space known as cyberspace.  ...  To keep pace with these advancements in cyber technologies there is a need to expand research and develop new cybersecurity methods and tools to secure these domains and environments.  ...  AI learns from big data and generates new rules for future cyber analytics. Good data is the lifeblood of AI.  ... 
arXiv:2207.01227v2 fatcat:54sdflwghrcd3dqodwn4fygtei

IEEE Access Special Section Editorial: Data Mining for Internet of Things

Chun-Wei Tsai, Mu-Yen Chen, Francesco Piccialli, Tie Qiu, Jason J. Jung, Patrick C. K. Hung, Sherali Zeadally
2021 IEEE Access  
Khadam et al., ''A steganography algorithm based on Cycle-GAN for covert communication in the Internet of Things,'' by Meng et al., ''Analysis of botnet domain names for IoT cybersecurity,'' by Li et al  ...  Compared to the approach of using a better machine, developing an effective or efficient algorithm is also a more cost-effective way for enhancing the overall performance of a system or device.  ... 
doi:10.1109/access.2021.3090137 fatcat:cnleukmukfgexmkwx7tino2k5y

Security improvements Zone Routing Protocol in Mobile Ad Hoc Network

Mahsa Seyyedtaj, Mohammad Ali Jabraeil Jamali
2014 International Journal of Computer Applications Technology and Research  
Proactive routing protocols: In it, all the nodes continuously search for routing information with in a network, so that when a route is needed, the route is already known.  ...  However, when there is a lot of node movement then the cost of maintaining all topology information is very high.  ...  A solution to this dilemma is steganography.  ... 
doi:10.7753/ijcatr0309.1001 fatcat:n7yb26a6zbgwnpvfmvka3cnpoq

Malware classification using XGboost-Gradient Boosted Decision Tree

Rajesh Kumar, Geetha S
2020 Advances in Science, Technology and Engineering Systems  
We propose in this work a malware classification scheme that constructs a model using low-end computing resources and a very large balanced dataset for malware.  ...  The model can be trained in low computation resources at less time in 1315 seconds with a reduction in feature set without affecting the performance for classification.  ...  It follows an accurate prediction by using a moderately inaccurate rule of rough and moderate heuristics. Adaptive boosting is upgraded to Adaptive, Reweighing, and Combine (ARC) algorithm.  ... 
doi:10.25046/aj050566 fatcat:7fko7vaksvdh3ky5a7a3cjtani

Music 2025 – The Music Data Dilemma: Issues Facing the Music Industry in Improving Data Management

Frank Lyons, Hyojung Sun, Dennis P Collopy, Kevin Curran, Paul Ohagan
2019 Social Science Research Network  
Acknowledgements The study was instigated by Peter Jenner, (the original manager of Pink Floyd), whose passion and future thinking about the music industry persuaded the IPO, and in particular David Humphries  ...  As a rule, each new recording needs a new ISRC; for example, any new musical elements, such as a new drum beat, new sessions etc. should require a new ISRC.  ...  single market: EU copyright rules fit for the digital age". 210 The prime objective of the proposed Article 13 of the proposed new rules was to focus on: "fair rules of the game for a better functioning  ... 
doi:10.2139/ssrn.3437670 fatcat:7pp2dv24cje27awzlsnfznent4

Ribosomal frameshifting and transcriptional slippage: From genetic steganography and cryptography to adventitious use

John F. Atkins, Gary Loughran, Pramod R. Bhatt, Andrew E. Firth, Pavel V. Baranov
2016 Nucleic Acids Research  
One facet of this is frameshifting that often results in synthesis of a C-terminal region encoded by a new frame.  ...  Utilization for synthesis of additional products occurs prominently in the decoding of mobile chromosomal element and viral genomes.  ...  The authors are highly appreciative of the key folks ('fellow stenographers of genetic steganography') they have worked with, Norma  ... 
doi:10.1093/nar/gkw530 pmid:27436286 pmcid:PMC5009743 fatcat:vyxew2vnv5dftmcx77l3bi4kcu

Internet Telephony [chapter]

Henning Schulzrinne
2004 The Practical Handbook of Internet Computing  
For example, a one-mile call from New Jersey to Manhattan costs the same 10 cents as a call from San Francisco to London.  ...  The cost per circuit is the annual investment cost for a 25-year lifetime.  ...  PANS Progressive scan: All lines in a frame are scanned consecutively. Typically used for computer displays, as it gives better quality for (moving) text. PSTN: Public Switched Telephone Network.  ... 
doi:10.1201/9780203507223.ch6 fatcat:3ljkkei7j5d3lhqedymkwcvpwu

Espionage in the Digital Age: How Technology is Impacting the Recruitment and Handling of Spies [article]

Kathryn W. Dehlinger, Austin, The University Of Texas At, Stephen B. Slick, Alan E. Kessler
2021
New developments in technology have both benefited and challenged human intelligence gathering.  ...  The introduction considers the impact of technology on society in general and will discuss the implications for the intelligence community.  ...  I am also indebted to the University of Texas at Austin as well as the Plan II Honors Program for such a wonderful undergraduate education that I will cherish forever.  ... 
doi:10.26153/tsw/11267 fatcat:rwvqtzna5bhnhhpccctvgkzhn4

Classifying Infected and Uninfected Red Blood Cell Images for Malaria Detection using Convolutional Neural Networks

2021 American Journal Of Advanced Computing  
Recompute the new cluster centers. 4. Repeat steps 2 and 3 until there is no change in reassignment of points.  ...  Then it will be classified as class-A using the rules depicted in the tree of Fig. 2 . Random forest is a variant of decision-tree algorithm.  ... 
doi:10.15864/ajac.2107 fatcat:cnqj7hzy6nbvlobtmrujhoy4bu

Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM), Summer Semester 2017 [article]

Georg Carle, Daniel Raumer, Lukas Schwaighofer, Chair Of Network Architectures
2017
By adding these costs, a new value of the constant cost per packet is calculated [16] .  ...  To meet those demands while saving costs (e.g. costs for hardware, software and energy consumption) and staying environmentally aware, new approaches to meet these demands have been developed.  ... 
doi:10.2313/net-2017-09-1 fatcat:qtxz2tweurbszpmvspmsek3bsq

Ribosomal Frameshifting and Transcriptional Slippage: From Genetic Steganography & Cryptography to Adventitious use

John F Atkins, Gary Loughran, Pramod R Bhatt, Andrew Firth, Pavel V Baranov, Apollo-University Of Cambridge Repository, Apollo-University Of Cambridge Repository
2016
One facet of this is frameshifting that often results in synthesis of a C-terminal region encoded by a new frame.  ...  Utilization for synthesis of additional products occurs prominently in the decoding of mobile chromosomal element and viral genomes.  ...  The authors apologize to those whose work on frameshifting they could not include, or dealt with too superficially, for space reasons. J.F.A. warmly thanks Ray  ... 
doi:10.17863/cam.423 fatcat:4daasrpepjfqhbhe4yii7zchb4

Stinging the Predators: A collection of papers that should never have been published

Zen Faulkes
2018 Figshare  
Each paper has a brief introduction.  ...  This ebook collects academic papers and conference abstracts that were meant to be so terrible that nobody in their right mind would publish them.  ...  I refer of course to the scientific news about the genetic eccentricities of the Catostomus commersonii, or white sucker, a common freshwater Cypriniform fish inhabiting the upper Midwest and Northeast  ... 
doi:10.6084/m9.figshare.5248264.v11 fatcat:bz72ceqdo5byjly6h4yuvazdyi
« Previous Showing results 1 — 15 out of 30 results