نتایج جستجو برای: significant
تعداد نتایج: 1215301 فیلتر نتایج به سال:
The central topic of this paper is the alternating greedy expansion of integers, which is defined to be a binary expansion with digits {0,±1} with the property that the nonzero digits have alternating signs. We collect known results about this alternating greedy expansion and complement it with other useful properties and algorithms. In the second part, we apply it to give an algorithm for comp...
In today’s information age, information sharing and transfer has increased exponentially. The information vulnerable to unauthorised access and interception, while in storage or transmission. The threat of an intruder and Steganalysis accessing secret information for sharing information over an unsecure or covert communication channels are vulnerable to intruder attacks. Although, these techniq...
Steganography consist of concealing secret information in a cover object to be sent over a public communication channel. It allows two parties to share hidden information in a way that no intruder can detect the presence of hidden information. This paper presents a novel steganography approach based on pixel location matching of the same cover image. Here the information is not directly embedde...
By looking for algorithms that require minimum arithmetic precision, we obtain a simple ray-polygon intersection test that more easily handles degenerate cases.
In this paper, we are going to introduce different types of steganography considering the cover data. As the first step, we will talk about text steganography and investigate its details. Then, image steganography and its techniques will be investigated. Some techniques including Least Significant Bits, Masking and filtering and Transformations will be subjected during image steganography. Fina...
The random lottery incentive system is widely used in experimental economics to motivate subjects. This paper investigates its validity. It reports three experiments which compare responses given to decision tasks which are embedded in random lottery designs with responses in ‘single choice’ designs in which each subject faces just one task for real. The experiments were designed to detect cros...
This paper presents a novel image hiding method that utilizes a two-way block-matching procedure to search for the highest-similarity block for each block of the important image. The bases and indexes obtained together with some not-well-matched blocks are recorded in the least significant bits of the cover image using a hop scheme. The method exhibits a high data payload, which reduces the sto...
A version of the discrete-ordinates method is used to solve, for the case of flow in a cylindrical tube, the classical Poiseuille and thermal-creep problems based on the Bhatnagar, Gross, and Krook model in the theory of rarefied-gas dynamics. In addition to the development of a discrete-ordinates solution that is valid for a wide range of the Knudsen number, the solution is evaluated numerical...
With the rapid development and wide use of Internet, information transmission faces a big challenge of security. People need a safe and secured way to transmit information. Digital watermarking is a technique of data hiding, which provide security of data. This paper presents a watermarking technique which least significant bits (LSB), its steps and its process with matlab images.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید