نتایج جستجو برای: f5

تعداد نتایج: 1852  

2011
Smriti Gupta Ranjeet Biswas

With the rapid application growing of internet and wireless network, information security becomes significant to protect commerce secret and personal privacy. Steganography plays crucial role for information security guarantee. There have been number of steganography embedding techniques proposed over last few years. In this paper, our goal is to evaluate number of JPEG steganography techniques...

2013
Hongxia Wang Gouxi Chen Meng Zhang

In order to improve the steganographic robustness of the algorithm in binary images, suppose an new steganographic method which deals with the edge of the binary image using mathematical morphology and combines F5 encoding method to embedded information. Marginalization and reconstruction on binary image by dilation and erosion operations, and tag blocks that can embed information to. Finally e...

2002
Gil Refael Stefan Kehrein Daniel S. Fisher

Random spin3 2 antiferromagnetic Heisenberg chains are investigated using an asymptotically exact renormalization group. Randomness is found to induce a quantum phase transition between two random-singlet phases. In the strong randomness phase the effective spins at low energies are Se f f5 3 2 , while in the weak randomness phase the effective spins are Se f f5 1 2 . Separating them is a quant...

2010
Antoine Joux Vanessa Vitse

Algebraic cryptanalysis usually requires to find solutions of several similar polynomial systems. A standard tool to solve this problem consists of computing the Gröbner bases of the corresponding ideals, and Faugère’s F4 and F5 are two well-known algorithms for this task. In this paper, we present a new variant of the F4 algorithm which is well suited to algebraic attacks of cryptosystems sinc...

2017
Xingang Jia Guanqun Zhu Qiuhong Han Zuhong Lu

In the process of biological knowledge discovery, PCA is commonly used to complement the clustering analysis, but PCA typically gives the poor visualizations for most gene expression data sets. Here, we propose a PCCF measure, and use PCA-F to display clusters of PCCF, where PCCF and PCA-F are modeled from the modified cumulative probabilities of genes. From the analysis of simulated and experi...

Journal: :J. Symb. Comput. 2013
Vladimir P. Gerdt Amir Hashemi Benyamin M.-Alizadeh

Article history: Received 2 June 2013 Accepted 15 July 2013 Available online xxxx

Journal: :Appl. Math. Lett. 2002
Nuh Aydin Irfan Siap

one of the most important problems of coding theory is to construct codes with beat possible minimum distances. In this paper, we use the algebraic structure of quasi-cyclic codes and the BCH type bound on the minimum distance to search for quasi-cyclic codes over IFS, the finite field with five elements, which improve the minimum distances of best-known linear codes. We construct 15 new linear...

Journal: :Discrete Mathematics 2009
Tatsuya Maruta Maori Shinohara Ayako Kikui

Let nq(k, d) be the smallest integer n for which there exists an [n, k, d]q code for given q, k, d. It is known that n8(4, d) = ∑3 i=0 ⌈ d/8i ⌉ for all d ≥ 833. As a continuation of Jones et al. [Electronic J. Combinatorics 13 (2006), #R43], we determine n8(4, d) for 117 values of d with 113 ≤ d ≤ 832 and give upper and lower bounds on n8(4, d) for other d using geometric methods and some exten...

2013
Rita Chhikara Deepika Bansal

PQ and F5 are two typical steganography methods of JPEG images and have been used widely. To compare the robustness of the above two algorithms, to withstand steganalytic attack a classification algorithm based on sensitive features is presented. SVM is used as a classifier using sensitive features extracted from two domains DCT and DWT. A comparison between the two types of features is also sh...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید