Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
Current color-printing technologies may use three or more inks, e.g., CMY, CMYK, CMYKcm, CMYKGO, CMYKRGB. When the number of inks exceeds three, there is the usual color-managemen...
Yongda Chen, Roy S. Berns, Lawrence A. Taplin, Fra...
In Computer Graphics, Collision Detection is considered a key problem with important applications in related areas. Several solutions have been proposed, but independently of the ...
Lidia M. Ortega, Francisco R. Feito, Clara I. Grim...
The random k-SAT model is extensively used to compare satisfiability algorithms or to find the best settings for the parameters of some algorithm. Conclusions are derived from the...
One area in which artificial neural networks (ANNs) may strengthen NLP systems is in the identification of words under noisy conditions. In order to achieve this benefit when spel...