scispace - formally typeset
Search or ask a question

Answers from top 7 papers

More filters
Papers (7)Insight
Our results suggest that simple randomization techniques are not sufficient to protect steganographic file systems from traffic analysis attacks.
Proceedings ArticleDOI
Kevin T. Mantel, Christopher M. Clark 
01 Dec 2012
11 Citations
Results show that a team of robots can explore more quickly when other trustworthy robots are present, without sacrificing performance when untrustworthy robots are also present.
We propose that our new method could be most appropriate for hiding any file in any non-standard cover file such as executable file such as .EXE or .COM file, compiler, MS-Office files, Data Base files such as .MDB, .PDF file.
Proceedings ArticleDOI
Giovanni Di Crescenzo, Faramak Vakil 
03 Nov 2006
13 Citations
We suggest to extend this principle so that not only changes to the file are detected, but also these changes are localized within the file; this is especially useful in the virus diagnostics which can then focus on the localized area in the file rather than the entire file.
Ultimately, understanding how users respond to robots and the reasons behind their responses will enable designers to creating domestic robots that are accepted into homes.
Similarly by applying a reverse method to the cover file, we show how easily the secret message can be recovered by the intended receiver.
The experiment shows that the two new algorithms can detect the unknown robots and unfriendly robots who do not obey the standard for robot exclusion.