Sciweavers

650 search results - page 52 / 130
» Distorting symmetric designs
Sort
View
TIFS
2008
159views more  TIFS 2008»
13 years 8 months ago
Chaotic-Type Features for Speech Steganalysis
We investigate the use of chaotic-type features for recorded speech steganalysis. Considering that data hiding within a speech signal distorts the chaotic properties of the origina...
Osman Hilmi Kocal, Emrah Yürüklü, I...
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 8 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
ISCAS
1995
IEEE
102views Hardware» more  ISCAS 1995»
14 years 8 days ago
Log-Domain Filters Based on LC Ladder Synthesis
Abstract. A design method is proposed for the synthesis of linear, high-order, continuous-time filters using a unique translinear integrator circuit. Unlike previous attempts at i...
D. Perry, Gordon W. Roberts
ASAP
2006
IEEE
130views Hardware» more  ASAP 2006»
14 years 2 months ago
Cross Layer Design to Multi-thread a Data-Pipelining Application on a Multi-processor on Chip
Data-Pipelining is a widely used model to represent streaming applications. Incremental decomposition and optimization of a data-pipelining application onto a multi-processor plat...
Bo-Cheng Charles Lai, Patrick Schaumont, Wei Qin, ...
ICCAD
2010
IEEE
162views Hardware» more  ICCAD 2010»
13 years 6 months ago
Practical placement and routing techniques for analog circuit designs
1In this paper, we will present an effective layout method for analog circuits. We consider symmetry constraint, common centroid constraint, device merging and device clustering du...
Linfu Xiao, Evangeline F. Y. Young, Xiaoyong He, K...