Sciweavers

37 search results - page 8 / 8
» On the Security of Image Manipulation Forensics
Sort
View
IJNSEC
2007
193views more  IJNSEC 2007»
13 years 5 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
JOCN
2010
103views more  JOCN 2010»
13 years 17 days ago
Functional Neuroimaging Can Support Causal Claims about Brain Function
Cognitive neuroscientists habitually deny that functional neuroimaging can furnish causal information about the relationship between brain events and behavior. However, imaging st...
Matthew J. Weber, Sharon L. Thompson-Schill