Shaohong Zhong

Learn More
Based on attributes permutation, an algorithm of Webpage information hiding is proposed, which overcomes the shortcoming of poor imperceptibility of Webpage algorithms currently in use, and improves the hiding capacity of the Webpage algorithm based on the order of attributes pair. The message , which is embedded into the Webpage, is firstly changed to a(More)
Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account(More)
Secret messages can be embedded into letters in tags of a Webpage in ways that are imperceptible to the human eye viewed with a browser. These messages, however, alter the inherent characteristic of the offset of a tag. This paper presents a new higher-order statistical steganalytic algorithm for detection of secret messages embedded in a Webpage. The(More)
Some 2-D and 3-D graphical representation of DNA sequences have been given by Nandy, Leong and Mogenthaler, and Randic et al., which give visual characterizations of DNA sequences, and a number of different approaches have been developed to date on numerically characterizing DNA sequences, but application of such method to practical problems still remains a(More)
  • 1