The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the past two decades, reversible data hiding (RDH), also referred to as lossless or invertible data hiding, has gradually become a very active research area in the field of data hiding. This has been verified by more and more papers on increasingly wide-spread subjects in the field of RDH research that have been published these days. In this paper, the various RDH algorithms and researches have...
An integrated heterogeneous wireless system (IHWS) combines different wireless access technologies together and provides a user with ubiquitous network connectivity. Security in such network is extremely critical for its successful implementation. However, each underlying network in an IHWS has a unique security scheme that cannot be adopted by other networks. Several security algorithms that have...
Providing effective means of congestion control in high BDP networks represents a complex paradigm facing a variety of challenges. The landscape of such paradigm is complicated considering limited availability of congestion signaling information as well as the diverse range of utilized links including but not limited to wireless and satellite links. In this paper, the results of a performance profiling...
This paper proposes a methodology for detecting intrusion in wireless sensor networks using Weak Hidden Markov Models (W-HMM). W-HMM is a non-parametric version of Hidden Markov models (HMM), wherein state transition probabilities are reduced to rules of reachability. In particular, we introduce scoring scheme and deviation alarm mechanisms to detect intrusion. Simulation results show that the methodology...
Recently, Variable-structure Congestion-control Protocol (VCP) has emerged as a great practical alternative of deployment for congestion control by requiring the use of only two ECN bits in the IP header. However, VCP suffers from a relatively low speed of convergence and exhibits biased fairness in moderate bandwidth high delay networks due to utilizing an insufficient amount of congestion feedback...
Embedding efficiency, which is defined as the average number of secret data bits embedded per one embedding change, is an important attribute directly influencing the security of steganography. Higher embedding efficiency is usually expected to get more secure steganographic method. In this paper, by incorporating two previously introduced techniques: the ldquosum and difference covering setrdquo...
As an important attribute directly influencing the steganographic scheme, the embedding efficiency is defined as the average number of random data bits per one embedding change. In this paper, we propose a novel approach to improve the embedding efficiency of LSB matching based on the sum and difference covering set (SDCS) of finite cyclic group. We show that the suitable choice of SDCS will lead...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.