300 THE MOVIE (Three Hundred)

The film is directed by Zack Snyder from the graphic novel 300 by Frank Miller about the Battle of Thermopylae

Saturday, January 15, 2011

Student Branch of Iranian Society of Cryptology (SBiSC)

Student Branch of Iranian Society of Cryptology
سومین شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
دومین شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
اولین شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
شاخه دانشجویی انجمن رمز ایران
Student Branch of Cryptology


Posted by blogger at 10:29 AM No comments:

Hora del juego

Hora del juego
Posted by blogger at 2:12 AM No comments:

Thursday, January 13, 2011

Student Branch of Iranian Society of Cryptology

شاخه دانشجویي انجمن رمز ایران در دانشگاه صنعتی شریف

Student Branch of Iranian Society of Cryptology
سومین شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
دومین شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
اولین شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
Student Branch of Cryptology


Posted by blogger at 11:15 AM No comments:

Monday, November 29, 2010

Multi Dimensional Correlation Steganalysis (MDCS)

Multidimensional Correlation Steganalysis
Multi-Dimensional Correlation Steganalysis
2-d correlated steganalysis
2-d cross correlation steganalysis
Multidimensional cross correlation
Local Entropies Sum
Cloud Min Sum
Multi-Dimensional Correlated Steganalysis (MDCS)
Multi-Dimensional Correlation (MDC)
Steganalysis by Dimensional Cross Correlation
Posted by blogger at 5:21 AM No comments:

Wednesday, November 10, 2010

Multi-dimensional Correlation Steganalysis

Multidimensional Correlation Steganalysis
Multi-Dimensional Correlation Steganalysis
2-d correlated steganalysis
2-d cross correlation steganalysis
Multidimensional cross correlation
Local Entropies Sum
Cloud Min Sum

Posted by blogger at 5:13 AM No comments:

Tuesday, November 9, 2010

Multi-Dimensional Correlated Steganalysis (MDCS)

Multi-Dimensional Correlated Steganalysis (MDCS)
Multi-Dimensional Correlation (MDC)
Steganalysis by Dimensional Cross Correlation
Posted by blogger at 4:45 AM No comments:

Wednesday, October 20, 2010

Eigenvalues Based Steganalysis

Singular Values Based Steganalysis
Singularvalues Based Steganalysis
Eigen Values Based Steganalysis
Eigenvalues Based Steganalysis
SV-based Steganalysis
SVD-based Steganography Analysis
EVBS
SVDS
SVS
EVS
Posted by blogger at 3:28 AM No comments:
Labels: Eigenvalues Based Steganalysis

Wednesday, October 13, 2010

Information Theoretic Analysis of Steganography

Information Theoretic Analysis of Steganography
Information-theoretic analysis of information hiding
An information-theoretic model for steganography
Analysis of LSB based image steganography techniques
Information hiding: steganography and watermarking
On the limits of steganography
Posted by blogger at 6:06 AM No comments:

Monday, October 11, 2010

GAME THEORY SIMULATOR

Game Theoretic Network Simulator


Game Theoretic Simulator
Game Theory Simulator
Sample simulations

Posted by blogger at 11:50 PM No comments:

Monday, September 20, 2010

SVD-based Steganalysis

SVD-based Steganalysis

http://sites.google.com/site/eigenvaluesbasedsteganalysis/

Posted by blogger at 4:48 AM No comments:
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Search This Blog

Blog Archive

  • ▼  2020 (1)
    • ▼  March (1)
      • CAPTAIN: Comprehensive Composition Assistance for ...
  • ►  2018 (2)
    • ►  November (2)
  • ►  2017 (11)
    • ►  October (3)
    • ►  September (2)
    • ►  August (2)
    • ►  July (3)
    • ►  May (1)
  • ►  2015 (1)
    • ►  March (1)
  • ►  2014 (3)
    • ►  November (2)
    • ►  September (1)
  • ►  2013 (4)
    • ►  April (2)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (7)
    • ►  November (2)
    • ►  September (1)
    • ►  July (1)
    • ►  May (1)
    • ►  February (2)
  • ►  2011 (15)
    • ►  October (1)
    • ►  September (1)
    • ►  May (7)
    • ►  April (1)
    • ►  January (5)
  • ►  2010 (21)
    • ►  November (3)
    • ►  October (3)
    • ►  September (7)
    • ►  August (8)
  • ►  2009 (3)
    • ►  November (3)
  • ►  2007 (4)
    • ►  July (1)
    • ►  April (1)
    • ►  March (1)
    • ►  January (1)

My Blog List

  • Absolute Security
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • Apple iPhone .ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • The Dawn of Darkness
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...
Powered by Blogger.