Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret

Author(s):  
Xinhao Sun ◽  
Kaixi Wang ◽  
Shujun Li
2014 ◽  
Vol 1014 ◽  
pp. 421-423
Author(s):  
Wei Gu

Splicing broken files played an important role in judicial evidence reconstruction, historical documents repair and military information obtainment and other fields. In this paper, we analyzed the reconstruction of broken pieces, which was modeled as an optimal matching problem. The Hamming distance was used as the matching degree of edge splicing. Firstly, we use the iterative threshold selection method to determine the gray scale threshold. Secondly, we chose the minimum summation of and as objective function. Then we use clustering analysis to classify the pieces into different lines, and selected the top and bottom position of the first line on each piece as decision variables. Finally, we took word width and column spacing into consideration and used row matching algorithm to splice lines into a complete image.


2019 ◽  
Vol 6 (2) ◽  
pp. 90-94
Author(s):  
Hernandez Piloto Daniel Humberto

In this work a class of functions is studied, which are built with the help of significant bits sequences on the ring ℤ2n. This class is built with use of a function ψ: ℤ2n → ℤ2. In public literature there are works in which ψ is a linear function. Here we will use a non-linear ψ function for this set. It is known that the period of a polynomial F in the ring ℤ2n is equal to T(mod 2)2α, where α∈ , n01- . The polynomials for which it is true that T(F) = T(F mod 2), in other words α = 0, are called marked polynomials. For our class we are going to use a polynomial with a maximum period as the characteristic polyomial. In the present work we show the bounds of the given class: non-linearity, the weight of the functions, the Hamming distance between functions. The Hamming distance between these functions and functions of other known classes is also given.


CFA Digest ◽  
2008 ◽  
Vol 38 (3) ◽  
pp. 35-36
Author(s):  
Michael Kobal
Keyword(s):  

Author(s):  
Sean Maw ◽  
Janice Miller Young ◽  
Alexis Morris

Most Canadian engineering students take a computing course in their first year that introduces them to digital computation. The Canadian Engineering Accreditation Board does not specify the language(s) that can or should be used for instruction. As a result, a variety of languages are used across Canada. This study examines which languages are used in degree-granting institutions, currently and in the recent past. It also examines why institutions have chosen the languages that they currently use. In addition to the language used in instruction, the types and hours of instruction are also analyzed. Methods of instruction and evaluation are compared, as well as the pedagogical philosophies of the different programs with respect to introductory computing. Finally, a comparison of the expected value of this course to graduates is also presented. We found a more diverse landscape for introductory computing courses than anticipated, in most respects. The guiding ethos at most institutions is skill and knowledge development, especially around problem solving in an engineering context. The methods to achieve this are quite varied, and so are the languages employed in such courses. Most programs currently use C/C++, Matlab, VB and/or Python.


2015 ◽  
Vol 4 (4) ◽  
pp. 17-24
Author(s):  
Hamsa A.Abdullah ◽  
◽  
Aalaa A. Abdulameer ◽  
Israa F. Hussein ◽  
◽  
...  
Keyword(s):  

2011 ◽  
Vol 10 (2) ◽  
pp. 1
Author(s):  
Y. ARBI ◽  
R. BUDIARTI ◽  
I G. P. PURNABA

Operational risk is defined as the risk of loss resulting from inadequate or failed internal processes or external problems. Insurance companies as financial institution that also faced at risk. Recording of operating losses in insurance companies, were not properly conducted so that the impact on the limited data for operational losses. In this work, the data of operational loss observed from the payment of the claim. In general, the number of insurance claims can be modelled using the Poisson distribution, where the expected value of the claims is similar with variance, while the negative binomial distribution, the expected value was bound to be less than the variance.Analysis tools are used in the measurement of the potential loss is the loss distribution approach with the aggregate method. In the aggregate method, loss data grouped in a frequency distribution and severity distribution. After doing 10.000 times simulation are resulted total loss of claim value, which is total from individual claim every simulation. Then from the result was set the value of potential loss (OpVar) at a certain level confidence.


KONVERGENSI ◽  
2019 ◽  
Vol 13 (1) ◽  
Author(s):  
Bima Agung Pratama ◽  
Fajar Astuti Hermawati

Penelitian ini mengajukan sebuah sistem pengenalan manusia melalui karakteristik pola fisiologis selaput pelangi (iris) matanya. Pengenalan selaput pelangi mata (iris recognition) merupakan suatu teknologi pengolahan citra yang digunakan untuk mendeteksi dan menampilkan selaput pelangi (iris) pada alat indera mata manusia saat kelopak mata terbuka. Terdapat beberapa tahap dalam proses pengenalan menggunakan pola iris mata manusia. Langkah pertama adalah melakukan proses segmentasi untuk mendapatkan daerah selaput pelangi (iris) mata yang berbentuk melingkat dengan menggunakan metode operator integro-diferensial. Selanjutnya dilakukan proses normalisasi hasil segmentasi menjadi bentuk polar dengan menerapkan metode metode Daughman’s rubber sheet model. Setelah itu diterapkan proses ekstraksi fitur atau pola dari citra ternormalisasi menggunakan filter Log-Gabor. Pencocokan untuk mengukur kesamaan antara pola iris mata manusia dengan pola-pola dalam basisdata sistem dilakukan menggunakan Hamming distance. Dalam percobaan pengenalan individu menggunakan basisdata iris mata MMU diperoleh akurasi sebesar 98%. Kata Kunci: Pengenalan selaput pelangi, Pengenalan iris mata, Filter log-Gabor, Segmentasi citra, Sistem biometrik


Sign in / Sign up

Export Citation Format

Share Document