Steganography using two sided, three sided, and four sided side match methods
نویسندگان
چکیده
منابع مشابه
Three-sided side match finite state vector quantization
Several effective low bit rate still image compression methods have been presented in these two years, such as SPHIT [9], Hybrid VQ [7], Wu and Chen method [10]. These methods exercise the analysis techniques (wavelet or subband) before distributing the bit rate to each piece of image, thus the tradeoff between bit rate and distortion can be resolved. In this paper, we try to propose a simple b...
متن کاملtwo- sided power distribution
In this paper, a new family of distributions with many applications in financial engineering have been introduced. This distribution contains important statistical distributions such as the triangular, exponential and uniform distribution. Initially considered a special case of this distribution And then survey The important features of it. How to calculate maximum likelihood estimates are pres...
متن کاملOn one-sided versus two-sided classification
One-sided classiiers are computable devices which read the characteristic function of a set and output a sequence of guesses which converges to 1 ii the set on the input belongs to the given class. Such a classiier is two-sided if the sequence of its output in addition converges to 0 on sets not belonging to the class. The present work obtains the below mentioned results for one-sided classes (...
متن کاملOne-sided Logic in Two-sided Markets
In this paper, I consider eight basic fallacies that can arise from using conventional wisdom from one-sided markets in two-sided market settings. These fallacies are illustrated using statements made in the context of regulatory investigations into credit card schemes in Australia and the United Kingdom. I discuss how these fallacies may be reconciled by proper use of a two-sided market analys...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: CSI Transactions on ICT
سال: 2013
ISSN: 2277-9078,2277-9086
DOI: 10.1007/s40012-013-0015-3