Real time implementation of stegofirewall system

MR Al-Sultan, SY Ameen… - International Journal of …, 2019 - journals.uob.edu.bh
Great efforts made to detect secret hidden information within digital files. Unfortunately,
these efforts are consuming large amount of time and may fail if the hidden information …

[HTML][HTML] Security and privacy-preserving metering service in the smart grid

Z Sun, C Song - International Journal of Communications, Network and …, 2017 - scirp.org
The deployment of smart metering provides an immense amount of data for power grid
operators and energy providers. By using this data, a more efficient and flexible power grid …

Artificial Intelligence and Applications

S Singh - 2022 - impressions.manipal.edu
I work in the broad areas of computational intelligence, artificial intelligence, neural
networks, machine learning, deep learning, game theory, mathematical logic, and natural …

모바일앱을이용한실시간사용자계정접근관리

최석환, 권준호, 최윤호 - 정보과학회컴퓨팅의실제논문지, 2017 - dbpia.co.kr
최근에 발생한 네이트와 옥션, 농협 등의 기업 및 대형 포털 웹 사이트에서의 도용된 ID 와
패스워드를 이용한 개인 정보의 유출 사고는 개인 정보 보호의 중요성을 시사한다. 사용자 …

[PDF][PDF] Steganography Over Video Files Using Multiple Least Significant Bits

J Kaur, MN Kumari - International Journal of Advanced Research in …, 2015 - Citeseer
Steganography is an excellent means of conversing covertly if there are guarantees on the
integrity of the channel of communication. If the video is seen by normal person, it is found …

Real-Time User Login Account Access Management Using Mobile App

S Choi, J Kwon, YH Choi - KIISE Transactions on Computing …, 2017 - koreascience.kr
Spill of personal information using a stolen ID and password that recently occurred in large
enterprises and portal web site such as Nate, Auction, National Agricultural Cooperative …