Zobrazeno 1 - 10
of 159
pro vyhledávání: '"M. Wilscy"'
Publikováno v:
Alexandria Engineering Journal, Vol 55, Iss 3, Pp 2771-2781 (2016)
Bots are malicious software entities that unobtrusively infect machines and silently engage in activities ranging from data stealing to cyber warfare. Most recent bot detection methods rely on regularity of bot command and control (C&C) traffic for b
Externí odkaz:
https://doaj.org/article/6dd02a2a4d834e66a915477742bda860
Publikováno v:
Journal of Intelligent & Fuzzy Systems. 41:5347-5357
Forged portraits of people are widely used for creating deceitful propaganda of individuals or events in social media, and even for cooking up fake pieces of evidence in court proceedings. Hence, it is very important to find the authenticity of the i
Publikováno v:
2022 International Conference on Connected Systems & Intelligence (CSI).
Publikováno v:
2022 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES).
Publikováno v:
Pervasive Computing and Social Networking ISBN: 9789811656392
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f799a8f79d443c36d281e28021643b78
https://doi.org/10.1007/978-981-16-5640-8_24
https://doi.org/10.1007/978-981-16-5640-8_24
Publikováno v:
Transactions on Computational Science and Computational Intelligence ISBN: 9783030494995
In every single day, a large number of digital images are uploading on Internet, but the authenticity of these images is uncertain. The propagation of the fake images via Internet may cause unwanted political and social unrest. So it is very essentia
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::26ae462b18494d9fb413d118d56f74c5
https://doi.org/10.1007/978-3-030-49500-8_3
https://doi.org/10.1007/978-3-030-49500-8_3
Publikováno v:
Multimedia Tools and Applications. 78:10565-10582
In this paper we propose a novel method based on Inverse Transitions for increasing the security of Least Significant Bit (LSB) replacement steganography. Before hiding data using LSB replacement, cover image is preprocessed using inverse transitions
Autor:
M. Wilscy, Meera Mary Isaac
Publikováno v:
Journal of Intelligent & Fuzzy Systems. 34:1679-1690
Autor:
S. Vishnukumar, M. Wilscy
Publikováno v:
Optics Communications. 404:80-93
In this paper, we propose a single image Super-Resolution (SR) method based on Compressive Sensing (CS) and Improved Total Variation (TV) Minimization Sparse Recovery. In the CS framework, low-resolution (LR) image is treated as the compressed versio
Publikováno v:
Expert Systems with Applications. 86:385-397
Multi-document summarization is the process of extracting salient information from a set of source texts and present that information to the user in a condensed form. In this paper, we propose a multi-document summarization system which generates an