نتایج جستجو برای: significant

تعداد نتایج: 1215301  

Journal: :Theor. Comput. Sci. 2005
Clemens Heuberger Rajendra S. Katti Helmut Prodinger Xiaoyu Ruan

The central topic of this paper is the alternating greedy expansion of integers, which is defined to be a binary expansion with digits {0,±1} with the property that the nonzero digits have alternating signs. We collect known results about this alternating greedy expansion and complement it with other useful properties and algorithms. In the second part, we apply it to give an algorithm for comp...

2012
Ankita Agarwal A. K. Vatsa

In today’s information age, information sharing and transfer has increased exponentially. The information vulnerable to unauthorised access and interception, while in storage or transmission. The threat of an intruder and Steganalysis accessing secret information for sharing information over an unsecure or covert communication channels are vulnerable to intruder attacks. Although, these techniq...

2017
Aminou Halidou Youssoufa Mohamadou Georges Delort

Steganography consist of concealing secret information in a cover object to be sent over a public communication channel. It allows two parties to share hidden information in a way that no intruder can detect the presence of hidden information. This paper presents a novel steganography approach based on pixel location matching of the same cover image. Here the information is not directly embedde...

2001
Jack Snoeyink

By looking for algorithms that require minimum arithmetic precision, we obtain a simple ray-polygon intersection test that more easily handles degenerate cases.

2011
Mehdi Hariri Ronak Karimi Masoud Nosrati

In this paper, we are going to introduce different types of steganography considering the cover data. As the first step, we will talk about text steganography and investigate its details. Then, image steganography and its techniques will be investigated. Some techniques including Least Significant Bits, Masking and filtering and Transformations will be subjected during image steganography. Fina...

1998
ROBIN P. CUBITT CHRIS STARMER

The random lottery incentive system is widely used in experimental economics to motivate subjects. This paper investigates its validity. It reports three experiments which compare responses given to decision tasks which are embedded in random lottery designs with responses in ‘single choice’ designs in which each subject faces just one task for real. The experiments were designed to detect cros...

2005
Ran-Zan Wang

This paper presents a novel image hiding method that utilizes a two-way block-matching procedure to search for the highest-similarity block for each block of the important image. The bases and indexes obtained together with some not-well-matched blocks are recorded in the least significant bits of the cover image using a hop scheme. The method exhibits a high data payload, which reduces the sto...

2000
C. E. Siewert

A version of the discrete-ordinates method is used to solve, for the case of flow in a cylindrical tube, the classical Poiseuille and thermal-creep problems based on the Bhatnagar, Gross, and Krook model in the theory of rarefied-gas dynamics. In addition to the development of a discrete-ordinates solution that is valid for a wide range of the Knudsen number, the solution is evaluated numerical...

2013
Gurpreet Kaur Kamaljeet Kaur

With the rapid development and wide use of Internet, information transmission faces a big challenge of security. People need a safe and secured way to transmit information. Digital watermarking is a technique of data hiding, which provide security of data. This paper presents a watermarking technique which least significant bits (LSB), its steps and its process with matlab images.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید