Adaptive Data Hiding Techniques for Secure Communication of Images 


Vol. 29,  No. 6, pp. 575-583, Jun.  2004


PDF
  Abstract

In this paper, we extend the multiple time scale control framework to the window-based congestion control, in particular, such as the TCP. This is performed by interfacing the TCP with a large time scale control module which adjusts the aggressiveness of the bandwidth consumption behavior exhibited by the TCP as a function of ab large time scale Seif-Similar network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by the RTT. How to effectively utilize such an information-due to its probabilistic nature, dispersion over the multiple time scales, and affection on the top of the existing window-based congestion controls-is a non-trivial problem.
The evaluation performance of the multiple time scale TCP is facilitated by a simulation of the bench-mark environment which is based on the physical modeling of a self-similar traffic. We explicate our methodology for discerning and evaluating the impact of changes in transport protocols in the protocol stack under the self-similar traffic conditions. We discuss issues arising in the comparative performance evaluation under heavy-tailed workloads.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

K. Suk and S. Ra, "Adaptive Data Hiding Techniques for Secure Communication of Images," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 6, pp. 575-583, 2004. DOI: .

[ACM Style]

Kyung-Hyu Suk and Sang-Dong Ra. 2004. Adaptive Data Hiding Techniques for Secure Communication of Images. The Journal of Korean Institute of Communications and Information Sciences, 29, 6, (2004), 575-583. DOI: .

[KICS Style]

Kyung-Hyu Suk and Sang-Dong Ra, "Adaptive Data Hiding Techniques for Secure Communication of Images," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 6, pp. 575-583, 6. 2004.