Sciweavers

180 search results - page 16 / 36
» An Information-Theoretic Model for Steganography
Sort
View
ASPDAC
2004
ACM
103views Hardware» more  ASPDAC 2004»
13 years 11 months ago
Design and implementation of a secret key steganographic micro-architecture employing FPGA
In the well-known "prisoners' problem", a representative example of steganography, two persons attempt to communicate covertly without alerting the warden. One appr...
Hala A. Farouk, Magdy Saeb
TIFS
2010
120views more  TIFS 2010»
13 years 2 months ago
Quantitative Structural Steganalysis of Jsteg
Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding changes introduced by steganography. In this paper, we propose two new cla...
Jan Kodovský, Jessica J. Fridrich
AUSAI
2009
Springer
14 years 2 months ago
MML Invariant Linear Regression
Abstract. This paper derives two new information theoretic linear regression criteria based on the minimum message length principle. Both criteria are invariant to full rank affine...
Daniel F. Schmidt, Enes Makalic
IPM
2006
167views more  IPM 2006»
13 years 7 months ago
Browsing mixed structured and unstructured data
Both structured and unstructured data, as well as structured data representing several different types of tuples, may be integrated into a single list for browsing or retrieval. D...
Robert M. Losee
AROBOTS
2004
125views more  AROBOTS 2004»
13 years 7 months ago
An Architecture for Distributed Environment Sensing with Application to Robotic Cliff Exploration
Future planetary exploration missions will use cooperative robots to explore and sample rough terrain. To succeed robots will need to cooperatively acquire and share data. Here a c...
Vivek A. Sujan, Steven Dubowsky, Terrance L. Hunts...