نتایج جستجو برای: low order bits embedding

تعداد نتایج: 2071507  

2010
Yi Mao Krishnakumar Balasubramanian Guy Lebanon

Text documents are complex high dimensional objects. To effectively visualize such data it is important to reduce its dimensionality and visualize the low dimensional embedding as a 2-D or 3-D scatter plot. In this paper we explore dimensionality reduction methods that draw upon domain knowledge in order to achieve a better low dimensional embedding and visualization of documents. We consider t...

Journal: :Mathematics and Computers in Simulation 2010
François Panneton Pierre L'Ecuyer

Besides speed and period length, the quality of uniform random number generators is usually assessed by measuring the uniformity of their point sets, formed by taking vectors of successive output values over their entire period length. For F2-linear generators, the commonly adopted measures of uniformity are based on the equidistribution of the most significant bits of the output. In this paper...

Journal: :CoRR 2018
Yihan Gao Chao Zhang Jian Peng Aditya G. Parameswaran

Learning distributed representations for nodes in graphs has become an important problem that underpins a wide spectrum of applications. Existing methods to this problem learn representations by optimizing a softmax objective while constraining the dimension of embedding vectors. We argue that the generalization performance of these methods are probably not due to the dimensionality constraint ...

Journal: :CoRR 2010
Yi Mao Krishnakumar Balasubramanian Guy Lebanon

Text documents are complex high dimensional objects. To effectively visualize such data it is important to reduce its dimensionality and visualize the low dimensional embedding as a 2-D or 3-D scatter plot. In this paper we explore dimensionality reduction methods that draw upon domain knowledge in order to achieve a better low dimensional embedding and visualization of documents. We consider t...

2016
Kamaljit Lakhtaria

Steganography has been practiced since ancient times. Many Linguistic Steganography (popularly known as Text based Steganography) algorithms have been proposed like Word Spacing, Substitution, Adjectives, Text Rotation, Mixed Case Font etc.. Information Hiding effectively means that the method/technique should be Robust, Secure and have good Embedding capacity. Measure of Similarity between cov...

2002
Cagatay Candan Nikil Jayant

We present a blind data hiding method for JPEG compressed images which minimizes the perceptual distortion due to data embedding. The proposed system presents a number of op. tions to the encoder to cast the given hidden bits in the compressed content signal. The perceptual distortion cost of each option is calculated from the parameters available to the encoder such as the original image, quan...

1998
Sergio D. Servetto Christine Podilchuk Kannan Ramchandran

In this work we study certain aspects of the problem of watermarking images, not for the classical example of ownership identi cation, but instead for embedding a unique identi er that can act as a \serial number" for the image in which it is embedded. In this context, two fundamental questions are: (a) what is the maximum number of di erent watermarks that can be distinguished reliably? (b) wh...

2014
Sadia Al Haque

Steganography is the art of hiding information in a manner that its very existence is not known. Unlike cryptography which only scrambles the content of the message so that it cannot be read, steganography is a more secure method as it hides the very existence of the message. This paper proposes a new image steganographic technique that embeds secret data only in the edge regions of the cover i...

2016
David Moure Pedro Torres Daniel M. Toma Joaquin del Rio Antoni Manuel

An acquisition system has been developed as an evolution of the gDT316 and gCNT16 dataloggers [1]. This new datalogger, gDT524, has several advantages in comparison with the previous versions. The main features, beside the low power consumption and low cost, are: an A/D converter with 24 bits fivechannels inputs, two 16 bits counters, meteorological sensors, real time clock with synchronization...

Journal: :J. Electronic Imaging 2013
Mohammad Fakhredanesh Mohammad Rahmati Reza Safabakhsh

This work presents adaptive image steganography methods which locate suitable regions for embedding by contourlet transform, while embedded message bits are carried in discrete cosine transform coefficients. The first proposed method utilizes contourlet transform coefficients to select contour regions of the image. In the embedding procedure, some of the contourlet transform coefficients may ch...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید