6,161 research outputs found
Substitution-based approach for linguistic steganography using antonym
Steganography has been a part of information technology security since a long time ago. The study of steganography is getting attention from researchers because it helps to strengthen the security in protecting content message during this era of Information Technology. In this study, the use of substitution-based approach for linguistic steganography using antonym is proposed where it is expected to be an alternative to the existing substitution approach that using synonym. This approach still hides the message as existing approach but its will change the semantic of the stego text from cover text. A tool has been developed to test the proposed approach and it has been verified and validated. This proposed approach has been verified based on its character length stego text towards the cover text, bit size types of the secret text towards the stego text and bit size types of the cover text towards the stego text. It has also been validated using four parameters, which are precision, recall, f-measure, and accuracy. All the results showed that the proposed approach was very effective and comparable to the existing synonym-based substitution approach
Equality in the Matrix Entropy-Power Inequality and Blind Separation of Real and Complex sources
The matrix version of the entropy-power inequality for real or complex
coefficients and variables is proved using a transportation argument that
easily settles the equality case. An application to blind source extraction is
given.Comment: 5 pages, in Proc. 2019 IEEE International Symposium on Information
Theory (ISIT 2019), Paris, France, July 7-12, 201
Stochastic Interpretation for the Arimoto Algorithm
The Arimoto algorithm computes the Gallager function for a given channel and parameter
, by means of alternating maximization. Along the way, it generates a
sequence of input distributions , , ... , that
converges to the maximizing input . We propose a stochastic
interpretation for the Arimoto algorithm. We show that for a random (i.i.d.)
codebook with a distribution , the next distribution
in the Arimoto algorithm is equal to the type () of the
feasible transmitted codeword that maximizes the conditional Gallager exponent
(conditioned on a specific transmitted codeword type ). This
interpretation is a first step toward finding a stochastic mechanism for
on-line channel input adaptation.Comment: 5 pages, 1 figure, accepted for 2015 IEEE Information Theory
Workshop, Jerusalem, Israe
Multikulturna edukacija: implicitna in eksplicitna etnocentricna edukacija – vsebinska analiza sodobnega izraelskega programa za vzgojo za vrednote
In the year 2000, Israel purportedly adopted a multicultural educational policy. It replaced the covert assimilation policy, which was referred to as ‘the integration policy’. The aim of the present study was to analyse the contemporary Israeli program of value education. Using the method of content analysis, the present study sought to determine whether the syllabi of the contemporary program reflect the adoption of a multicultural educational policy, or whether they produce only multicultural rhetoric. The findings reveal that the program reflected mainly the pluralistic approach while still maintaining traces of ethnocentric rhetoric of certain syllabi in the program. (DIPF/Orig.
Multiple-Description Coding by Dithered Delta-Sigma Quantization
We address the connection between the multiple-description (MD) problem and
Delta-Sigma quantization. The inherent redundancy due to oversampling in
Delta-Sigma quantization, and the simple linear-additive noise model resulting
from dithered lattice quantization, allow us to construct a symmetric and
time-invariant MD coding scheme. We show that the use of a noise shaping filter
makes it possible to trade off central distortion for side distortion.
Asymptotically as the dimension of the lattice vector quantizer and order of
the noise shaping filter approach infinity, the entropy rate of the dithered
Delta-Sigma quantization scheme approaches the symmetric two-channel MD
rate-distortion function for a memoryless Gaussian source and MSE fidelity
criterion, at any side-to-central distortion ratio and any resolution. In the
optimal scheme, the infinite-order noise shaping filter must be minimum phase
and have a piece-wise flat power spectrum with a single jump discontinuity. An
important advantage of the proposed design is that it is symmetric in rate and
distortion by construction, so the coding rates of the descriptions are
identical and there is therefore no need for source splitting.Comment: Revised, restructured, significantly shortened and minor typos has
been fixed. Accepted for publication in the IEEE Transactions on Information
Theor
- …