Sciweavers

753 search results - page 113 / 151
» Statistical Measurement of Information Leakage
Sort
View
98
Voted
ICIP
2006
IEEE
16 years 2 months ago
Cover Selection for Steganographic Embedding
The primary goal of image steganography techniques has been to maximize embedding rate while minimizing the detectability of the resulting stego images against steganalysis techni...
Mehdi Kharrazi, Taha Taha Sencar, Nasir D. Memon
103
Voted
ICIP
2003
IEEE
16 years 2 months ago
A hidden Markov model based framework for recognition of humans from gait sequences
In this paper we propose a generic framework based on Hidden Markov Models (HMMs) for recognition of individuals from their gait. The HMM framework is suitable, because the gait o...
Aravind Sundaresan, Amit K. Roy Chowdhury, Rama Ch...
WWW
2007
ACM
16 years 1 months ago
Why we search: visualizing and predicting user behavior
The aggregation and comparison of behavioral patterns on the WWW represent a tremendous opportunity for understanding past behaviors and predicting future behaviors. In this paper...
Eytan Adar, Daniel S. Weld, Brian N. Bershad, Stev...
92
Voted
WWW
2007
ACM
16 years 1 months ago
A large-scale study of robots.txt
Search engines largely rely on Web robots to collect information from the Web. Due to the unregulated open-access nature of the Web, robot activities are extremely diverse. Such c...
Yang Sun, Ziming Zhuang, C. Lee Giles
KDD
2004
ACM
195views Data Mining» more  KDD 2004»
16 years 28 days ago
Improved robustness of signature-based near-replica detection via lexicon randomization
Detection of near duplicate documents is an important problem in many data mining and information filtering applications. When faced with massive quantities of data, traditional d...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...