Learning analytics-need of centralized portal for access to e-learning resources
Recently, e-learning resources become widespread in school education worldwide, as they
are a prerequisite for an efficient learning process. These resources are scattered across …
are a prerequisite for an efficient learning process. These resources are scattered across …
From fishing to phishing
EEH Lastdrager - 2018 - research.utwente.nl
From Fishing To Phishing Page 1 From Fishing to Phishing Elmer Lastdrager Page 2 Page 3
FROM FISHING TO PHISHING ELMER LASTDRAGER Page 4 PROMOTIECOMMISSIE …
FROM FISHING TO PHISHING ELMER LASTDRAGER Page 4 PROMOTIECOMMISSIE …
Correlation-based steganalysis of modular data hiding methods
S Ilchev, Z Ilcheva - Proceedings of the 15th International Conference on …, 2014 - dl.acm.org
In this paper, we present a new steganalysis approach based on correlation and create four
correlation-based steganalysis methods for the analysis of JPEG images. Our main goal is to …
correlation-based steganalysis methods for the analysis of JPEG images. Our main goal is to …
[PDF][PDF] Modular Digital Watermarking for Image Verification and Secure Data Storage in Web Applications
S Ilchev, Z Ilcheva - Serdica Journal of Computing, 2014 - serdica-comp.math.bas.bg
Our modular approach to data hiding is an innovative concept in the data hiding research
field. It enables the creation of modular digital watermarking methods that have extendable …
field. It enables the creation of modular digital watermarking methods that have extendable …