Leonard J. Popyack

Learn More
— Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characterization. Recently, new intrusion detection systems based on data mining are making their appearance in the field. This paper describes the design and experiences with the ADAM(More)
A new approach to transparent embedding of data into digital images is proposed. It provides a high rate of the embedded data and is robust to common and some intentional distortions. The developed technique employs properties of the singular value decomposition (SVD) of a digital image. According to these properties each singular value (SV) specifies the(More)
The task of digital image compression is the subject of many researches for many years. Up to now this task remains a topic of constant interest. The reason of such interest is that digital media and digital communication are becoming of growing significance worldwide. The subject of this paper is a new original approach to digital image compression. It is(More)
  • 1