منابع مشابه
Wiretap Channel with Information Embedding on Actions
Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it s...
متن کاملOn Monotone Embedding in Information Geometry
A paper was published (Harsha and Subrahamanian Moosath, 2014) in which the authors claimed to have discovered an extension to Amari’s α-geometry through a general monotone embedding function. It will be pointed out here that this so-called (F,G)-geometry (which includes F -geometry as a special case) is identical to Zhang’s (2004) extension to the α-geometry, where the name of the pair of mono...
متن کاملColor-Constant Information Embedding
We propose a technique to embed information in the color of a printed surface. One or more reference surfaces are used to help compensate for the color changes due to varying illuminants. Seven different techniques, some of which are novel, are considered for color compensation. Experiments using different performance metrics are presented, providing a comparative assessment of the various algo...
متن کاملEmbedding Hypermedia into Information Systems
This paper discusses the integration of hypermedia as a value-added support functionality into computer-based information systems. These include a large base of scientific and business applications, which people use primarily for their underlying analytic functionality. Hypermedia features supplement these applications, providing access to the application's primary activities, and support for t...
متن کاملEmbedding Verifiable Information Flow Analysis1
Pervasive computing is the next generation of computing environments. As a result more and more applications are dynamically deployed on a growing set of small safe devices. Applications delivered by different vendors may share code and data while they may not trust one another. We present an information flow analysis for full Java bytecode adapted for applications dedicated to embedded systems...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2014
ISSN: 0018-9448,1557-9654
DOI: 10.1109/tit.2014.2358676