Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
We describe the Protein Subcellular Location Image Database (PSLID), which collects and structures 2-D through 5-D fluorescence microscope images, annotations, and derived feature...
Kai Huang, Jennifer Lin, James A. Gajnak, Robert F...
Maximum entropy analysis of binary variables provides an elegant way for studying the role of pairwise correlations in neural populations. Unfortunately, these approaches suffer f...
Abstract—This paper proposes methods for information processing of audio streams using methods of information geometry. We lay the theoretical groundwork for a framework allowing...
—This paper describes an empirical study that addresses the issue of communication among members of a software development organization. In particular, data was collected concern...