This paper examines the role of attacker’s memory in Quantization Index Modulation (QIM) watermarking systems. First we derive the attacker’s noise distribution that maximizes...
: In this paper, we present a computational approach to understanding and augmenting the conversational knowledge process. We introduce the concept of the conversation quantization...
Ken Saito, Hidekazu Kubota, Yasuyuki Sumi, Toyoaki...
The minimization of cost, power consumption and timeto-market of DSP applications requires the development of methodologies for the automatic implementation of floating-point alg...
The inherent bistability and picosecond time-scale switching of the resonant tunneling diode (RTD) provides an ideal element for the design of digital circuits and analog signal q...
T. P. E. Broekaert, B. Brar, F. Morris, A. C. Seab...
lye propose a lossy image coding scheme based on the recently introduced even-stacked cosine modulated filter banks (CSIFBs) that allow linear phase filters in all channels. We des...