Zobrazeno 1 - 10
of 192
pro vyhledávání: '"Shiuh-Jeng Wang"'
Publikováno v:
IEEE Access, Vol 10, Pp 67686-67693 (2022)
Information hiding techniques are used to hide confidential data in digital carriers. It is difficult for malicious users to detect the existence of confidential data within the digital carriers. Audios, images, or videos can call be digital carriers
Externí odkaz:
https://doaj.org/article/51556ea494ba401dab1eddf6567a23f2
Publikováno v:
The Journal of Supercomputing. 78:7749-7767
Publikováno v:
2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications ISBN: 9783031054907
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f0fa1abc000de980e6b84c1b44b970b2
https://doi.org/10.1007/978-3-031-05491-4_5
https://doi.org/10.1007/978-3-031-05491-4_5
Publikováno v:
2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications ISBN: 9783031054907
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::290bc9d5a14251a4af2d83ed63dde4d0
https://doi.org/10.1007/978-3-031-05491-4_4
https://doi.org/10.1007/978-3-031-05491-4_4
Publikováno v:
Information Sciences. 517:128-147
This study presents a robust and transparent watermarking method that exploits block-based discrete cosine transform (DCT) coefficient modification. The difference in the DCT coefficients of two blocks is calculated and modified based on the watermar
Publikováno v:
The Journal of Supercomputing. 77:77-94
The increasing usage of mobile cloud computing leads the cloud to become a hotbed of crime. Cloud storage is different from previous data storage in digital forensics. In this paper, we concentrate on gathering evidence from mobile iOS devices and th
Publikováno v:
Journal of Visual Communication and Image Representation. 59:14-32
Information security is one of the most challenging issues. Cryptography and Steganography techniques are two popular methods for protecting data privacy. In this study, an information hiding method with dynamic embedding capacity based on vector qua
Publikováno v:
2020 International Conference on Pervasive Artificial Intelligence (ICPAI).
EDoS (Economic Denial of Sustainability) attack is always a major threat to the cloud platform. Many researchers have developed countermeasure mechanisms against EDoS attack. The EDoS-ADS is proposed by Shawahna et al. in 2018, this mechanism can ide
Autor:
Hung-Yuan Chen, Ying-Chin Chen, Chang-Po Chiang, Shiuh-Jeng Wang, Tyan-Muh Tsai, Shih-Hao Chang
Publikováno v:
ICFET
Detecting cyber army in manipulating public opinions has been a new issue with the popularity of social media. This paper will take the first social media cyber army case in Taiwan to analyze embedding operation systems. By analyzing suspended accoun
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030468279
The main characteristic of Advanced Persistent Threats is the stealthy and long period of attack. These threats usually aim at stealing secure information and include six phases: (i) Reconnaissance, (ii) Delivery, (iii) Initial intrusion, (iv) Comman
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8318a035cbdd553d54f293febfd04c20
https://doi.org/10.1007/978-3-030-46828-6_1
https://doi.org/10.1007/978-3-030-46828-6_1