نتایج جستجو برای: hide characteristics
تعداد نتایج: 666265 فیلتر نتایج به سال:
In this paper, we propose a novel method called DHSED to hide binary visual patterns in two error diffused halftone images. While one halftone image is only a regular error diffused image, stochastic error diffusion is applied to the other image to generate special stochastic characteristics with respect to the first image such that the visual pattern would appear when the two halftone images a...
The Tiny Encryption Algorithm (TEA) is a suitable lightweight cryptographic algorithm used in medium security systems such as RFID systems. The TEA is a fiestel structure used to satisfy the confusion and the diffusion properties to hide the statistical characteristics of the plaintext. However, TEA has few weaknesses, most notably from equivalent keys and related-key attacks. So, a Modified TE...
Feedback Control Loops (FCLs) are the heart of any self-adaptive system. Existing engineering approaches for building self-adaptive systems mask FCL by providing abstraction layers that hide the application complexity. In this paper, we investigate a model-driven approach for the engineering of FCLs whose architecture is based on the Service Component Architecture (SCA) model. Our proposal cons...
We explore two different threading approaches on a graphics processing unit (GPU) exploiting two different characteristics of the current GPU architecture. The fat thread approach tries to minimise data access time by relying on shared memory and registers potentially sacrificing parallelism. The thin thread approach maximises parallelism and tries to hide access latencies. We apply these two a...
In this paper, we propose an algorithm to hide secret message in DNA String to increase the security during transmission of data. On preparation, we consider the behavior and characteristics of DNA sequences. In this paper, we propose a new Binary Coded DNA rules towards Data Hiding in DNA. DNA String is identified randomly where a secret message is encoded at Sender’s end. Same DNA String is u...
In this paper, we enrich the π-calculus with an operator for confidentiality (hide), whose main effect is to restrict the access to the object of the communication, thus representing confidentiality in a natural way. The hide operator is meant for local communication, and it differs from new in that it forbids the extrusion of the name and hence has a static scope. Consequently, a communication...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید