Sciweavers

36 search results - page 3 / 8
» Gibbs Construction in Steganography
Sort
View
TIFS
2008
194views more  TIFS 2008»
13 years 9 months ago
Detection of Double-Compression in JPEG Images for Applications in Steganography
This paper presents a method for detection of double JPEG compression and a maximum likelihood estimator of the primary quality factor. These methods are essential for construction...
Tomás Pevný, Jessica J. Fridrich
GECCO
2004
Springer
131views Optimization» more  GECCO 2004»
14 years 3 months ago
PolyEDA: Combining Estimation of Distribution Algorithms and Linear Inequality Constraints
Estimation of distribution algorithms (EDAs) are population-based heuristic search methods that use probabilistic models of good solutions to guide their search. When applied to co...
Jörn Grahl, Franz Rothlauf
IH
2005
Springer
14 years 3 months ago
Efficient Wet Paper Codes
Abstract. Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipien...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
UAI
2004
13 years 11 months ago
From Fields to Trees
We present new MCMC algorithms for computing the posterior distributions and expectations of the unknown variables in undirected graphical models with regular structure. For demon...
Firas Hamze, Nando de Freitas
ISMB
1993
13 years 11 months ago
Identification of Localized and Distributed Bottlenecks in Metabolic Pathways
The usual thermodynamicevaluation, based solely on the Standard Gibbs Energyof reaction, does not take into account the permissible ranges of concentrations of metabolites, and it...
Michael L. Mavrovouniotis