An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Clustering has been one of the most widely studied topics in data mining and k-means clustering has been one of the popular clustering algorithms. K-means requires several passes ...
This paper presents an improved technique to detect evoked potentials in continuous EEG recordings using a spiking neural network. Human EEG signals recorded during spell checking,...
Piyush Goel, Honghai Liu, David J. Brown, Avijit D...
The performance of face recognition systems that use two-dimensional images depends on factors such as lighting and subject's pose. We are developing a face recognition system...
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...