Sciweavers

3370 search results - page 156 / 674
» Correlation Embedding Analysis
Sort
View
ICIP
2008
IEEE
16 years 5 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
121
Voted
ICIP
2000
IEEE
16 years 5 months ago
Performance Analysis of an H.263 Video Encoder for VIRAM
VIRAM (Vector Intelligent Random Access Memory) is a vector architecture processor with embedded memory, designed for portable multimedia processing devices. Its vector processing...
Thinh P. Q. Nguyen, Avideh Zakhor, Katherine A. Ye...
ICONS
2008
IEEE
15 years 10 months ago
Analysis of Hybrid Systems Using HySAT
In this paper we describe the complete workflow of analyzing the dynamic behavior of safety-critical embedded systems with HySAT. HySAT is an arithmetic constraint solver with a ...
Christian Herde, Andreas Eggers, Martin Fränz...
KES
2005
Springer
15 years 9 months ago
Analysis of Parity Assignment Steganography in Palette Images
Abstract. In parity assignment-based steganography for palette images, all colors in a host image are divided into two subsets, and each pixel is used to carry one secret bit. This...
Xinpeng Zhang, Shuozhong Wang
117
Voted
FMCAD
2007
Springer
15 years 7 months ago
A Mechanized Refinement Framework for Analysis of Custom Memories
We present a framework for formal verification of embedded custom memories. Memory verification is complicated ifficulty in abstracting design parameters induced by the inherently ...
Sandip Ray, Jayanta Bhadra