نتایج جستجو برای: low order bits embedding
تعداد نتایج: 2071507 فیلتر نتایج به سال:
Text documents are complex high dimensional objects. To effectively visualize such data it is important to reduce its dimensionality and visualize the low dimensional embedding as a 2-D or 3-D scatter plot. In this paper we explore dimensionality reduction methods that draw upon domain knowledge in order to achieve a better low dimensional embedding and visualization of documents. We consider t...
Besides speed and period length, the quality of uniform random number generators is usually assessed by measuring the uniformity of their point sets, formed by taking vectors of successive output values over their entire period length. For F2-linear generators, the commonly adopted measures of uniformity are based on the equidistribution of the most significant bits of the output. In this paper...
Learning distributed representations for nodes in graphs has become an important problem that underpins a wide spectrum of applications. Existing methods to this problem learn representations by optimizing a softmax objective while constraining the dimension of embedding vectors. We argue that the generalization performance of these methods are probably not due to the dimensionality constraint ...
Text documents are complex high dimensional objects. To effectively visualize such data it is important to reduce its dimensionality and visualize the low dimensional embedding as a 2-D or 3-D scatter plot. In this paper we explore dimensionality reduction methods that draw upon domain knowledge in order to achieve a better low dimensional embedding and visualization of documents. We consider t...
Steganography has been practiced since ancient times. Many Linguistic Steganography (popularly known as Text based Steganography) algorithms have been proposed like Word Spacing, Substitution, Adjectives, Text Rotation, Mixed Case Font etc.. Information Hiding effectively means that the method/technique should be Robust, Secure and have good Embedding capacity. Measure of Similarity between cov...
We present a blind data hiding method for JPEG compressed images which minimizes the perceptual distortion due to data embedding. The proposed system presents a number of op. tions to the encoder to cast the given hidden bits in the compressed content signal. The perceptual distortion cost of each option is calculated from the parameters available to the encoder such as the original image, quan...
In this work we study certain aspects of the problem of watermarking images, not for the classical example of ownership identi cation, but instead for embedding a unique identi er that can act as a \serial number" for the image in which it is embedded. In this context, two fundamental questions are: (a) what is the maximum number of di erent watermarks that can be distinguished reliably? (b) wh...
Steganography is the art of hiding information in a manner that its very existence is not known. Unlike cryptography which only scrambles the content of the message so that it cannot be read, steganography is a more secure method as it hides the very existence of the message. This paper proposes a new image steganographic technique that embeds secret data only in the edge regions of the cover i...
An acquisition system has been developed as an evolution of the gDT316 and gCNT16 dataloggers [1]. This new datalogger, gDT524, has several advantages in comparison with the previous versions. The main features, beside the low power consumption and low cost, are: an A/D converter with 24 bits fivechannels inputs, two 16 bits counters, meteorological sensors, real time clock with synchronization...
This work presents adaptive image steganography methods which locate suitable regions for embedding by contourlet transform, while embedded message bits are carried in discrete cosine transform coefficients. The first proposed method utilizes contourlet transform coefficients to select contour regions of the image. In the embedding procedure, some of the contourlet transform coefficients may ch...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید