Sciweavers

237 search results - page 15 / 48
» On information hiding with incomplete information about steg...
Sort
View
ICDE
2008
IEEE
130views Database» more  ICDE 2008»
15 years 11 months ago
A Sampling-Based Approach to Information Recovery
There has been a recent resurgence of interest in research on noisy and incomplete data. Many applications require information to be recovered from such data. For example, in sens...
Junyi Xie, Jun Yang 0001, Yuguo Chen, Haixun Wang,...
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 3 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
15 years 4 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
AAAI
2010
14 years 11 months ago
Bayesian Matrix Factorization with Side Information and Dirichlet Process Mixtures
Matrix factorization is a fundamental technique in machine learning that is applicable to collaborative filtering, information retrieval and many other areas. In collaborative fil...
Ian Porteous, Arthur Asuncion, Max Welling
OTM
2010
Springer
14 years 7 months ago
Towards Duplicate Detection for Situation Awareness Based on Spatio-temporal Relations
Abstract. Systems supporting situation awareness typically integrate information about a large number of real-world objects anchored in time and space provided by multiple sources....
Norbert Baumgartner, Wolfgang Gottesheim, Stefan M...