Audio Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. It is a method that ensures secured data transfer between parties normally in internet commu...
The point of departure in assessment of projects is the selection of planning and design advantages. So, the prime issues for the projects threefold. First, the evaluation criteria are generally multiple and often struct...
The Retinex is an image enrichment algorithm that improves the brightness, contrast and sharpness of an image. A new method for enhancing the contrast of inhomogeneous images by retinex algorithm is proposed. It can corr...
"Cross-Site Scripting (XSS) attacks are a type of
injection, in which malicious scripts are injected into
otherwise benign and trusted web sites. XSS attacks occur
when an attacker uses a web application to send maliciou...
Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security
Audio Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. It is a method that ensures secured data transfer between parties normally in internet commu...
Basic Concepts of Expert System Shells and an Efficient Model for Knowledge Acquisition
Basic Concepts of Expert System Shells and an Efficient Model for Knowledge Acquisition
Fuzzy Multi-Attribute Approach in Project Assessment
The point of departure in assessment of projects is the selection of planning and design advantages. So, the prime issues for the projects threefold. First, the evaluation criteria are generally multiple and often struct...
Enhancement and Correction of Medical Images Using Multiscale Retinex
The Retinex is an image enrichment algorithm that improves the brightness, contrast and sharpness of an image. A new method for enhancing the contrast of inhomogeneous images by retinex algorithm is proposed. It can corr...
Automation of Mutated Cross Site Scripting
"Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send maliciou...