The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is very important and practical to make data analysis for intrusion detection based on large scale data. For the current system problem in simulation and off-line analysis, a set of system is proposed as intrusion detection and analysis for truly website. The system is integrated with two subsystems of intrusion detection and large data analysis. Through network construction and software design,...
The high computational complexity and great memory requirement prevent the SIFT algorithm from being processed realtimely. The block-parallel SIFT algorithm with boundary extension adopted by existing researches suffers from redundant storages or extra communications to process the boundaries of partitions. The block-parallel SIFT algorithm without boundary extension (pSIFT-noBE) can spontaneously...
It is very important and practical to transform messages securely through the web pages. A kind of two-bit hiding approach is proposed to double the hiding capacity of webpage table than the existing method. Meanwhile, considering the status of multiple table structure in a webpage, the features of parallel tables and embedding tables are analyzed. The algorithms of multiple table hiding and table...
Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum...
A new sensitive rule hiding algorithm, including two processes of weak association transaction adding and strong association transaction removing, is presented based on the devotion degree of transactions to the discovered association rules. The approach and algorithm are stated in detail aiming to hide simple rules,including two types of single rule and composed rule.Four item modification methods...
It is very important to resist on the typical attacks for the watermarking algorithms. From the data distribution analysis in time domain before and after attacking on the audio, the relation of four consecutive bins in a data histogram can keep its change within plusmn 5%. A data range selection approach, which meets the demands of normal distribution, is created generally for the watermark hiding...
Filtering processing is a kind of typical and serious attack on the audio watermarking algorithm. Based on the computation in time domain before and after attacking on the audio, the mean and the standard deviation show good invariant statistical feature. The relation of four consecutive bins in a histogram can keep the change within plusmn5%. A data range selection approach, which meets the demands...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.