6,161 research outputs found

    Substitution-based approach for linguistic steganography using antonym

    Get PDF
    Steganography has been a part of information technology security since a long time ago. The study of steganography is getting attention from researchers because it helps to strengthen the security in protecting content message during this era of Information Technology. In this study, the use of substitution-based approach for linguistic steganography using antonym is proposed where it is expected to be an alternative to the existing substitution approach that using synonym. This approach still hides the message as existing approach but its will change the semantic of the stego text from cover text. A tool has been developed to test the proposed approach and it has been verified and validated. This proposed approach has been verified based on its character length stego text towards the cover text, bit size types of the secret text towards the stego text and bit size types of the cover text towards the stego text. It has also been validated using four parameters, which are precision, recall, f-measure, and accuracy. All the results showed that the proposed approach was very effective and comparable to the existing synonym-based substitution approach

    Notions of Fairness And Contingent Fees

    Get PDF

    Equality in the Matrix Entropy-Power Inequality and Blind Separation of Real and Complex sources

    Full text link
    The matrix version of the entropy-power inequality for real or complex coefficients and variables is proved using a transportation argument that easily settles the equality case. An application to blind source extraction is given.Comment: 5 pages, in Proc. 2019 IEEE International Symposium on Information Theory (ISIT 2019), Paris, France, July 7-12, 201

    Stochastic Interpretation for the Arimoto Algorithm

    Full text link
    The Arimoto algorithm computes the Gallager function maxQE0(ρ,Q)\max_Q {E}_{0}^{}(\rho,Q) for a given channel P(yx){P}_{}^{}(y \,|\, x) and parameter ρ\rho, by means of alternating maximization. Along the way, it generates a sequence of input distributions Q1(x){Q}_{1}^{}(x), Q2(x){Q}_{2}^{}(x), ... , that converges to the maximizing input Q(x){Q}_{}^{*}(x). We propose a stochastic interpretation for the Arimoto algorithm. We show that for a random (i.i.d.) codebook with a distribution Qk(x){Q}_{k}^{}(x), the next distribution Qk+1(x){Q}_{k+1}^{}(x) in the Arimoto algorithm is equal to the type (Q{Q}') of the feasible transmitted codeword that maximizes the conditional Gallager exponent (conditioned on a specific transmitted codeword type Q{Q}'). This interpretation is a first step toward finding a stochastic mechanism for on-line channel input adaptation.Comment: 5 pages, 1 figure, accepted for 2015 IEEE Information Theory Workshop, Jerusalem, Israe

    Multikulturna edukacija: implicitna in eksplicitna etnocentricna edukacija – vsebinska analiza sodobnega izraelskega programa za vzgojo za vrednote

    Get PDF
    In the year 2000, Israel purportedly adopted a multicultural educational policy. It replaced the covert assimilation policy, which was referred to as ‘the integration policy’. The aim of the present study was to analyse the contemporary Israeli program of value education. Using the method of content analysis, the present study sought to determine whether the syllabi of the contemporary program reflect the adoption of a multicultural educational policy, or whether they produce only multicultural rhetoric. The findings reveal that the program reflected mainly the pluralistic approach while still maintaining traces of ethnocentric rhetoric of certain syllabi in the program. (DIPF/Orig.

    Multiple-Description Coding by Dithered Delta-Sigma Quantization

    Get PDF
    We address the connection between the multiple-description (MD) problem and Delta-Sigma quantization. The inherent redundancy due to oversampling in Delta-Sigma quantization, and the simple linear-additive noise model resulting from dithered lattice quantization, allow us to construct a symmetric and time-invariant MD coding scheme. We show that the use of a noise shaping filter makes it possible to trade off central distortion for side distortion. Asymptotically as the dimension of the lattice vector quantizer and order of the noise shaping filter approach infinity, the entropy rate of the dithered Delta-Sigma quantization scheme approaches the symmetric two-channel MD rate-distortion function for a memoryless Gaussian source and MSE fidelity criterion, at any side-to-central distortion ratio and any resolution. In the optimal scheme, the infinite-order noise shaping filter must be minimum phase and have a piece-wise flat power spectrum with a single jump discontinuity. An important advantage of the proposed design is that it is symmetric in rate and distortion by construction, so the coding rates of the descriptions are identical and there is therefore no need for source splitting.Comment: Revised, restructured, significantly shortened and minor typos has been fixed. Accepted for publication in the IEEE Transactions on Information Theor
    corecore