To search, Click below search items.
All Published Papers Search Service
Title
Combining Multiple Techniques for Intrusion Detection
Author
Ronghua Yao, Qijun Zhao, Hongtao Lu
Vol. 6 No. 2 pp. 208~218
Keywords
intrusion detection system, combined detection model, fusion method.
A Novel Watermark Algorithm for Integrity Protection of XML Documents
Vol. 6 No. 2 pp. 202~207
Extensible Markup Language (XML), Integrity Protection, Watermark, Signature, Principal Component Analysis (PCA)
Ridgelet-Based Robust and Perceptual Watermarking for Images
Xiao Liang, Wei Zhihui, Wu Huizhong
Vol. 6 No. 2 pp. 194~201
Information security, digital watermark, ridgelet transform, perceptual embedding, blindly detection
Secret Image Sharing Using Pseudo-Random Sequence
Anil Kumar, Navin Rajpal
Vol. 6 No. 2 pp. 185~193
Steganography, Cryptography, Secret sharing, and Pseudo ?Random Sequence