نتایج جستجو برای: embedding method

تعداد نتایج: 1686665  

The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of Contourlet coefficients. The suspicious image is transformed into Contourlet space, and then the statistics of Contourlet subbands coefficients are extracted as features. We us...

Journal: :The Journal of Biophysical and Biochemical Cytology 1961
R. F. Baker H. E. Pearson

The electron microscopy of sections of isolated cells, such as tissue culture cells, white cells, or red blood cells, presents special problems in handling and orientation. When it is desired to retain the original relationship between cells, as, for example, tissue culture cells growing on a glass surface, it is necessary to process and embed the cells in situ (1, 2). One of the disadvantages ...

2003
Yair Bartal Nathan Linial Manor Mendel Assaf Naor

Fréchet’s classical isometric embedding argument has evolved to become a major tool in the study of metric spaces. An important example of a Fréchet embedding is Bourgain’s embedding [4]. The authors have recently shown [2] that for every ε > 0 any n-point metric space contains a subset of size at least n1−ε which embeds into `2 with distortion O ( log(2/ε) ε ) . The embedding used in [2] is no...

Journal: :CoRR 2016
Minjeong Kim Minsuk Choi Sunwoong Lee Jian Tang Haesun Park Jaegul Choo

Embedding and visualizing large-scale high-dimensional data in a two-dimensional space is an important problem since such visualization can reveal deep insights out of complex data. Most of the existing embedding approaches, however, run on an excessively high precision, ignoring the fact that at the end, embedding outputs are converted into coarsegrained discrete pixel coordinates in a screen ...

2010
Peter GOČ-MATIS Tomáš KANÓCZ Radovan RIDZOŇ Dušan LEVICKÝ

This paper describes a new method for video watermark embedding, using the knowledges already available from watermark embedding into digital static pictures. The watermark is embedded in transformed domain using Discrete Wavelet Transform (DWT). This paper also describes experiments conducted on the proposed watermark embedding method. The goal of these experiments was the test the robustness ...

2013
Ahmed Elgohary Ahmed K. Farahat Mohamed S. Kamel Fakhri Karray

This paper proposes an efficient embedding method for scaling kernel k-means on cloud infrastructures. The embedding method allows for approximating the computation of the nearest centroid to each data instance and, accordingly, it eliminates the quadratic space and time complexities of the cluster assignment step in the kernel k-means algorithm. We show that the proposed embedding method is ef...

2013
W. Hsu L. S. Hsu M. F. Tenorio M. F. TENORIO

Abetract Previously, we have presented a method for embedding selection based on cluster analysis. In this paper, we described an embedding selection method based on a feature reduction transformation matrix. This method extracts features that are important for maintaining decision boundaries in the supervised clusters. Experimentally, we demonstrate that our method allow accurate prediction of...

Journal: :CoRR 2013
Mohammad Norouzi Tomas Mikolov Samy Bengio Yoram Singer Jonathon Shlens Andrea Frome Gregory S. Corrado Jeffrey Dean

Several recent publications have proposed methods for mapping images into continuous semantic embedding spaces. In some cases the embedding space is trained jointly with the image transformation. In other cases the semantic embedding space is established by an independent natural language processing task, and then the image transformation into that space is learned in a second stage. Proponents...

2012
Anita Pradhan

In this paper three image steganography methods with variable rate of embedding are proposed. In the first method, called two neighbor method the two neighboring pixels such as upper and left are exploited to take embedding decisions. In three neighbor method the three neighboring pixels such as upper, left and right are exploited to take embedding decisions. In four neighbor method the four ne...

Journal: :Mobile Information Systems 2021

With the rising number of Internet users, there has been a rapid increase in cyberbullying. Among types cyberbullying, verbal abuse is emerging as most serious problem, for preventing which profanity being identified and blocked. However, users employ words cleverly to avoid blocking. existing discrimination methods, deliberate typos using special characters can be discriminated with high accur...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید