In this paper,in order to increase the amount of hiding information,we choose MPEG sequences as carriers and present a practical method focus on the steganographic method in MPEG compressed video ***,there are many B-...
详细信息
In this paper,in order to increase the amount of hiding information,we choose MPEG sequences as carriers and present a practical method focus on the steganographic method in MPEG compressed video ***,there are many B-frames in each *** utilize the B-frames to hide information so that we can increase the amount of hiding information and decrease the tamper of the *** and extracting are performed in compressed video sequences without requiring original *** experimental results show that the proposed method has the characteristics of less tampering on the visual effect and larger hiding capacity without increasing the volume of the carrier file.
In this paper, we investigate belief revision in possibilistic logic, which is a weighted logic proposed to deal with incomplete and uncertain information. Existing revision operators in possibilistic logic are restri...
详细信息
In this paper, a novel steganography based on joint photographic expert-group (JPEG) is proposed. The proposed method embeds two secret bits into each middle frequency coefficient using the least two-significant bits ...
详细信息
In this paper, a novel steganography based on joint photographic expert-group (JPEG) is proposed. The proposed method embeds two secret bits into each middle frequency coefficient using the least two-significant bits (2-LSBs). For the rest coefficients, the quantization error, resulting from processing the JPEG-compressed image, is compensated while embedding variable-length secret bits. At last, a JPEG stego-image is generated using the quality factor with the value of 100. Experimental results show that, the proposed steganographic method can provide a high information hiding capacity and keep the visual quality well.
Protocol state machine is very essential in networksecurity and implementation fields, however, improper management of software evolution, compounded by changing and imprecise requirements, along with "short tim...
详细信息
Protocol state machine is very essential in networksecurity and implementation fields, however, improper management of software evolution, compounded by changing and imprecise requirements, along with "short time to market" phenomenon, often leads to a lack of up-to-date specifications and they are often characterized by bugs, anomalies and even threads. How to mine the accurate protocol state machine under investigation is still an open problem. We address this problem by using an interactive grammar inference technique as it could generate queries to the protocol implementation in learning process. This paper describes: (1) a flexible method to construct and parse real packet according to the packet format, (2) how to generate packet queries to explore protocol state machine space, (3) applies the QSM technology to mine protocol state machine from network traces. To access the usefulness of our approach, several experiments for different protocols are performed and we could get more objective and accurate results compared with other protocol specification mining methods.
Cloud computing is a hot topic of current research, for anonymous authentication is required in many applications scenarios of e-business based on cloud computing, users do not want to expose their identity, users jus...
详细信息
Independent Component Analysis (ICA) using reference signal is a useful tool for extracting a desired independent component (IC). Reference signal is served asa priori information to conduct ICA to converge to the loc...
详细信息
Cloud computing is an important innovation of current computing models. At present, the research on the security of cloud computing is mainly concentrated on PCs and servers. The security of embedded system in cloud e...
详细信息
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t...
详细信息
In this paper, a novel concept of multilayer synthesis and a general framework for texture synthesis method are presented. Within this framework, we first decompose the texture into the supposed pattern layer and mate...
详细信息
In this paper, a novel concept of multilayer synthesis and a general framework for texture synthesis method are presented. Within this framework, we first decompose the texture into the supposed pattern layer and material layer in the frequency domain by an E-texton extracting algorithm, then manipulate and extend them respectively according to their own personalities, and finally merge the newly synthesized pattern layer and material layer again to generate the final output. Experiment results show that our method not only greatly improves the synthesis quality for those cases that single-layer synthesis cannot handle well but also provides an ability of achieving various special synthesis effects.
A parallel framework for NURBS-based isogeometric analysis on multi-core cpus is presented in this paper. The framework is composed of two parts: (1) construction of the stiffness matrix and right hand side vector;(2)...
详细信息
暂无评论