Learn More
Data hiding encompasses a wide range of applications for embedding messages in content. However, hiding data inevitably destroys the host image, even though the distortion is imperceptible. To enhance the hiding capacity and maintain the quality of the host image after embedding hidden data, in this paper, we present a high payload reversible data hiding(More)
This study used aptitude treatment interaction design to examine how feedback formats (specific vs. holistic) and executive thinking styles (high vs. low) affect web-based peer assessment. An Internet-based (anonymous) peer-assessment system was developed and used by 58 computer science students who submitted assignments for peer review. The results(More)
Kakugawa et aL proposed the k-majority coterie for the distributed k-mutual exclusion problem (k-mutex). It was claimed that the k-majority coterie is a k-coterie, which is a general solution for k-mutex. In this comment, we show that the k-majority coterie is not necessary a k-coterie. Kakugawa et al. proposed the k-majority coterie for the distributed(More)
Context: Web services are emerging technologies that enable application to application communication and reuse of autonomous services over Web. Composition of web services is a concept of integrating individual web services to conduct complex business transactions based on functionality and performance constraints Objective: To satisfy user requirements,(More)