Sciweavers

271 search results - page 17 / 55
» The lattice of embedded subsets
Sort
View
ICIP
2005
IEEE
14 years 2 months ago
Minmax strategies for QIM watermarking subject to attacks with memory
This paper examines the role of attacker’s memory in Quantization Index Modulation (QIM) watermarking systems. First we derive the attacker’s noise distribution that maximizes...
Pierre Moulin, Anil Kumar Goteti
CHARME
1999
Springer
100views Hardware» more  CHARME 1999»
14 years 1 months ago
Xs are for Trajectory Evaluation, Booleans are for Theorem Proving
Abstract. This paper describes a semantic connection between the symbolic trajectory evaluation model-checking algorithm and relational verification in higher-order logic. We prov...
Mark Aagaard, Thomas F. Melham, John W. O'Leary
CONCUR
2008
Springer
13 years 10 months ago
Strategy Construction for Parity Games with Imperfect Information
We consider imperfect-information parity games in which strategies rely on observations that provide imperfect information about the history of a play. To solve such games, i.e., t...
Dietmar Berwanger, Krishnendu Chatterjee, Laurent ...
ICIP
2002
IEEE
14 years 10 months ago
On steganalysis of random LSB embedding in continuous-tone images
Abstract? In this paper we present an LSB steganalysis technique that can detect the existence of hidden messages that are randomly embedded in the least significant bits of natura...
Sorina Dumitrescu, Xiaolin Wu, Nasir D. Memon
NIPS
2004
13 years 10 months ago
Multiple Relational Embedding
We describe a way of using multiple different types of similarity relationship to learn a low-dimensional embedding of a dataset. Our method chooses different, possibly overlappin...
Roland Memisevic, Geoffrey E. Hinton