Multi Carrier Steg against Omni Attacks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi Carrier Steg against Omni Attacks

Information is considered as the most valuable resource in today's data-centric world. In recent times there has been a prodigious growth in information transmission. Parallel to it the data hiding techniques have also developed to sustain information authentication and confidentiality. Traditionally data was hidden in covers such as text, images and audio. But, all these enclosed the data befo...

متن کامل

Multi-prover Commitments Against Non-signaling Attacks

We reconsider the concept of two-prover (and more generally: multi-prover) commitments, as introduced in the late eighties in the seminal work by Ben-Or et al. As was recently shown by Crépeau et al., the security of known two-prover commitment schemes not only relies on the explicit assumption that the two provers cannot communicate, but also depends on what their information processing capabi...

متن کامل

Abstracts [Implantate-Steg] 072010

Materials and Methods: Seventy-six patients who received two or four interforaminal implants were assigned to one of three different bar designs and subsequently to different prosthesis supporting systems. Forty-nine patients received implants and a mucosa-supported implantretained overdenture (OD) with an ovoid bar (two implants; design 1) or multiple ovoid bars (four implants; design 2). Twen...

متن کامل

Multi - View Omni - Directional Imaging

This paper describes a novel camera design for the creation of multiple panoramic images, such that each location in the scene may be viewed from different viewpoints in different images. The resulting images can be viewed by a human observer, creating depth and motion sensation. The new camera can create images with a field of view of up to a full 360, and can have viewpoints from a range of p...

متن کامل

Multi-Defender Strategic Filtering Against Spear-Phishing Attacks

Spear-phishing attacks pose a serious threat to sensitive computer systems, since they sidestep technical security mechanisms by exploiting the carelessness of authorized users. A common way to mitigate such attacks is to use e-mail filters which block e-mails with a maliciousness score above a chosen threshold. Optimal choice of such a threshold involves a tradeoff between the risk from delive...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2010

ISSN: 0975-8887

DOI: 10.5120/952-1329