Detection of Content Adaptive LSB Matching (a Game Theory Approach)
|
|
- Bethany Baldwin
- 5 years ago
- Views:
Transcription
1 Detection of Content Adaptive LSB Matching (a Game Theory Approach) Tomáš Denemark, Jessica Fridrich / 5
2 Content-adaptive steganography Every pixel is changed with probability β i = exp( λρ i) + exp( λρ i ), where ρ i 0 are costs for each pixel and λ determined from the payload constrain n n i= h(β i) = α. Costs determined by image content = approximately available to Warden who can adjust detector accordingly. How does this change Alice s embedding strategy? 2 / 5
3 Two fundamental approaches Omnipotent Warden [Cachin, 998] Warden knows payload and embedding probabilities for each pixel. Alice minimizes KL divergence between cover/stego distributions. 2 Ignorant Warden [Böhme, 202] Warden knows only the payload. Alice can embed suboptimally (not minimize KL-div) to utilize mismatch of Warden s detector. Our contribution We investigate modern steganography (LSBM). Warden uses LRT for detection. 3 / 5
4 Notation Gaussian density with mean µ and variance σ 2 : ( ) f (x; µ, σ 2 ) = (2πσ 2 ) /2 (x µ)2 exp 2σ 2, {, 0, }-mixture of Gaussian densities with a parameter 0 β /2: f β (x; σ 2 ) = β 2 f (x;, σ2 ) + ( β)f (x; 0, σ 2 ) + β 2 f (x;, σ2 ). 4 / 5
5 Cover Model We assume cover is a sequence of n independent Gaussians X i with unequal variances σ 2 i : X = (X,..., X n ), X i N(0, σ 2 i ), i =,..., n. 5 / 5
6 Embedding Method Alice uses LSBM with change rates β (A) i, i =,..., n. Stego image Y = (Y,..., Y n ), β (A) i /2 for s i =, Pr(Y i = x i + s i ) = β (A) i for s i = 0, β (A) i /2 for s i =. Therefore Y i f (A) β (x, σi 2 ) i Change rates must satisfy payload constraint n i= h(β (A) i ) = αn 6 / 5
7 Warden s Detector Simple binary hypothesis test: β (W) i H 0 : X i f (x, 0, σ 2 i ), i, H : X i f (W) β (x, σi 2 ), i, i are change rates assumed by Warden Warden uses the Likelihood Ratio Test (LRT): T(x; β (W), σ 2 ) = n i= f (W) β (x i, σi 2 ) i f (x i, 0, σi 2) β (W) = (β (W),..., β (W) n ) and σ 2 = (σ 2,..., σ2 n) 7 / 5
8 Alice and Warden Play Game Players: Alice and Warden Strategies: β (A) = (β (A),..., β n (A) ) and β (W) = (β (W),..., β n (W) ) Payoff function: total error probability P E = min P FA ( 2 (P FA + P MD ) The game solution is in Nash equilibrium. ) 8 / 5
9 Two Pixel Model Because of the computational and numerical complexity we limit ourselves to covers consisting of two pixels. Strategies: (β (A), β (A) 2 ), (β (W), β (W) 2 ) are in fact one-dimensional since the second beta is determined from payload. [Omnipotent Warden] KL divergence minimal at (β (A,), β (A,) 2 ) [Ignorant Warden] Nash equilibrium at (β (A,2), β (A,2) 2 ) 9 / 5
10 Solution PE β (W) β (A) 0. Figure: Payoff function P E (β (A), β (W) ) for α = 0.2, σ 2 =, σ 2 2 =.2. Smooth, with a unique saddle point [Kuhn, 2003] solution exists in pure strategies, in said saddle point. 0 / 5
11 Results KL divergence KL divergence P E / β (A) P E / β (W) PE/ β (A,W) β (A) = β (W) Figure: α = 0.2, σ 2 =, σ 2 2 =.2. / 5
12 Results β (A,) β (A,2) β (A) α Figure: Alice s strategies under both scenarios β (A,), β (A,2) as a function of α for σ 2 = and σ 2 2 =.2. 2 / 5
13 Results β (A,) β (A,2) 0. β (A) σ 2 2 /σ2 Figure: Alice s strategies under both scenarios β (A,), β (A,2) as a function of content diversity measured by the ratio σ 2 2/σ 2 for α = 0.4 and σ 2 =. 3 / 5
14 D KL Results 4 D KL /D () KL DKL DKL/D () KL α Figure: Warden s loss in her ability to detect Alice s embedding, D KL (ln T H 0 ln T H ) and D KL /D () KL, as a function of α for σ 2 = and σ2 2 =.2. 4 / 5
15 Summary In practice Warden rarely has full access to the steganographic channel. Even the simplistic two pixel cover source reveals interesting phenomena: Nash equilibrium point of minimal KL divergence. It pays off for Alice to trade optimality for a mismatched detector. It is always advantageous for Alice to embed a slightly larger payload into the element with a smaller variance. The difference between optimal strategies increases with increasing α. The difference between optimal strategies decreases with increasing differences between σ 2 and σ 2 2. Computational complexity and numerical issues prevent scaling up this approach to realistic covers. 5 / 5
Detection of Content Adaptive LSB Matching (a Game Theory Approach)
Detection of Content Adaptive LSB Matching (a Game Theory Approach) Tomáš Denemark and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA ABSTRACT This paper is an attempt to analyze the interaction
More informationDetection of Content Adaptive LSB Matching (a Game Theory Approach)
Detection of Content Adaptive LSB Matching (a Game Theory Approach) Tomáš Denemark and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA ABSTRACT This paper is an attempt to analyze the interaction
More informationComplete characterization of perfectly secure stego-systems with mutually independent embedding operation
Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton,
More informationFisher Information Determines Capacity of ε-secure Steganography
Fisher Information Determines Capacity of ε-secure Steganography Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York 11th Information Hiding, Darmstadt,
More informationInformation Hiding and Covert Communication
Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design
More informationA Study of Embedding Operations and Locations for Steganography in H.264 Video
A Study of Embedding Operations and Locations for Steganography in H.264 Video Andreas Neufeld and Andrew D. Ker Oxford University Department of Computer Science Andreas Neufeld is now with the Image and
More informationImperfect Stegosystems
DISSERTATION DEFENSE Imperfect Stegosystems Asymptotic Laws and Near-Optimal Practical Constructions Tomá² Filler Dept. of Electrical and Computer Engineering SUNY Binghamton, New York April 1, 2011 2
More informationContent-Adaptive Steganography by Minimizing Statistical Detectability
1 Content-Adaptive Steganography by Minimizing Statistical Detectability Vahid Sedighi, Member, IEEE, Rémi Cogranne, Member, IEEE, and Jessica Fridrich, Senior Member, IEEE Abstract Most current steganographic
More informationAdaptive Steganography and Steganalysis with Fixed-Size Embedding
Adaptive Steganography and Steganalysis with Fixed-Size Embedding Benjamin Johnson ae, Pascal Schöttle b, Aron Laszka c, Jens Grossklags d, and Rainer Böhme b a Cylab, Carnegie Mellon University, USA b
More informationImproving Selection-Channel-Aware Steganalysis Features
Improving Selection-Channel-Aware Steganalysis Features Tomáš Denemark and Jessica Fridrich, Department of ECE, SUNY Binghamton, NY, USA, {tdenema1,fridrich}@binghamton.edu, Pedro Comesaña-Alfaro, Department
More informationLecture 8: Signal Detection and Noise Assumption
ECE 830 Fall 0 Statistical Signal Processing instructor: R. Nowak Lecture 8: Signal Detection and Noise Assumption Signal Detection : X = W H : X = S + W where W N(0, σ I n n and S = [s, s,..., s n ] T
More informationROC Curves for Steganalysts
ROC Curves for Steganalysts Andreas Westfeld Technische Universität Dresden Institut für Systemarchitektur 01062 Dresden mailto:westfeld@inf.tu-dresden.de 1 Introduction There are different approaches
More informationSteganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory
Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University
More informationImage Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT
Image Data Compression Steganography and steganalysis 1 Stenography vs watermarking Watermarking: impercep'bly altering a Work to embed a message about that Work Steganography: undetectably altering a
More informationMINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich
MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA {tomas.filler, fridrich}@binghamton.edu
More informationThe Square Root Law of Steganographic Capacity
The Square Root Law of Steganographic Capacity ABSTRACT Andrew D. Ker Oxford University Computing Laboratory Parks Road Oxford OX1 3QD, UK adk@comlab.ox.ac.uk Jan Kodovský Dept. of Electrical and Computer
More information2. What are the tradeoffs among different measures of error (e.g. probability of false alarm, probability of miss, etc.)?
ECE 830 / CS 76 Spring 06 Instructors: R. Willett & R. Nowak Lecture 3: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics Executive summary In the last lecture we
More informationTheoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory
Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory Rémi Cogranne, Member, IEEE, ICD - ROSAS - LM2S Troyes University of Technology - UMR 6281, CNRS 12, rue Marie Curie
More informationLecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics. 1 Executive summary
ECE 830 Spring 207 Instructor: R. Willett Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics Executive summary In the last lecture we saw that the likelihood
More informationGeneralized Transfer Component Analysis for Mismatched Jpeg Steganalysis
Generalized Transfer Component Analysis for Mismatched Jpeg Steganalysis Xiaofeng Li 1, Xiangwei Kong 1, Bo Wang 1, Yanqing Guo 1,Xingang You 2 1 School of Information and Communication Engineering Dalian
More informationQuantitative Steganalysis of LSB Embedding in JPEG Domain
Quantitative Steganalysis of LSB Embedding in JPEG Domain Jan Kodovský, Jessica Fridrich September 10, 2010 / ACM MM&Sec 10 1 / 17 Motivation Least Significant Bit (LSB) embedding Simplicity, high embedding
More informationIMPERFECT STEGOSYSTEMS ASYMPTOTIC LAWS AND NEAR-OPTIMAL PRACTICAL CONSTRUCTIONS
IMPERFECT STEGOSYSTEMS ASYMPTOTIC LAWS AND NEAR-OPTIMAL PRACTICAL CONSTRUCTIONS BY TOMÁŠ FILLER M.S. in Computer Science, Czech Technical University, Prague, 2007 DISSERTATION Submitted in partial fulfillment
More informationELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals
ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals Jingxian Wu Department of Electrical Engineering University of Arkansas Outline Matched Filter Generalized Matched Filter Signal
More informationSTATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE
2th European Signal Processing Conference EUSIPCO 22) Bucharest, Romania, August 27-3, 22 STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE Rémi Cogranne, Cathel Zitzmann,
More informationNEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST
IGOR BELI^, ALEKSANDER PUR NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST There are several problems where it is very important to know whether the tested data are distributed according to the
More informationQUESTION ONE Let 7C = Total Cost MC = Marginal Cost AC = Average Cost
ANSWER QUESTION ONE Let 7C = Total Cost MC = Marginal Cost AC = Average Cost Q = Number of units AC = 7C MC = Q d7c d7c 7C Q Derivation of average cost with respect to quantity is different from marginal
More informationMinimizing Embedding Impact in Steganography using Trellis-Coded Quantization
Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization Tomáš Filler, Jan Judas, and Jessica Fridrich Department of Electrical and Computer Engineering SUNY Binghamton, Binghamton,
More informationNon-zero-sum Game and Nash Equilibarium
Non-zero-sum Game and Nash Equilibarium Team nogg December 21, 2016 Overview Prisoner s Dilemma Prisoner s Dilemma: Alice Deny Alice Confess Bob Deny (-1,-1) (-9,0) Bob Confess (0,-9) (-6,-6) Prisoner
More informationDetection theory. H 0 : x[n] = w[n]
Detection Theory Detection theory A the last topic of the course, we will briefly consider detection theory. The methods are based on estimation theory and attempt to answer questions such as Is a signal
More informationQuantitative Structural Steganalysis of Jsteg
Quantitative Structural Steganalysis of Jsteg Jan Kodovský and Jessica Fridrich, Member, IEEE Abstract Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding
More informationSTEGANOGRAPHY is the practice and study of techniques
INFOCOMMUNICATIONS JOURNAL Modeling Content-Adaptive Steganography with Detection Costs as a Quasi-Zero-Sum Game Aron Laszka, Member, IEEE, Ádám Máté Földes, Member, IEEE, Abstract Recently, content-adaptive
More informationGame Theory. Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin
Game Theory Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin Bimatrix Games We are given two real m n matrices A = (a ij ), B = (b ij
More informationPATTERN RECOGNITION AND MACHINE LEARNING
PATTERN RECOGNITION AND MACHINE LEARNING Slide Set 3: Detection Theory January 2018 Heikki Huttunen heikki.huttunen@tut.fi Department of Signal Processing Tampere University of Technology Detection theory
More informationJPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts
JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts Jan Kodovský and Jessica Fridrich Department of ECE, Binghamton University, NY, USA {fridrich,jan.kodovsky}@binghamton.edu
More informationMatrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography
Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Anindya Sarkar, Student Member, IEEE, Upamanyu Madhow, Fellow, IEEE, and B. S. Manjunath,
More informationSteganography via Codes for Memory with Defective Cells
Steganography via Codes for Memory with Defective Cells Jessica Fridrich a, Miroslav Goljan a, and David Soukal b a Department of Electrical and Computer Engineering, b Department of Computer Science SUNY
More informationGame Theory Review Questions
Game Theory Review Questions Sérgio O. Parreiras All Rights Reserved 2014 0.1 Repeated Games What is the difference between a sequence of actions and a strategy in a twicerepeated game? Express a strategy
More informationTwo hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Thursday 17th May 2018 Time: 09:45-11:45. Please answer all Questions.
COMP 34120 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE AI and Games Date: Thursday 17th May 2018 Time: 09:45-11:45 Please answer all Questions. Use a SEPARATE answerbook for each SECTION
More informationNecessary Corrections in Intransitive Likelihood-Ratio Classifiers
Necessary Corrections in Intransitive Likelihood-Ratio Classifiers Gang Ji and Jeff Bilmes SSLI-Lab, Department of Electrical Engineering University of Washington Seattle, WA 9895-500 {gang,bilmes}@ee.washington.edu
More informationOptimal Detection of OutGuess using an Accurate Model of DCT Coefficients
Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients Thanh Hai Thai, Rémi Cogranne, Florent Retraint ICD - ROSAS - LMS - Troyes University of Technology - UMR 68, CNRS Troyes - France
More informationRandom Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,
Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen
More informationInformation Hiding. Andrew D. Ker. 10 Lectures, Hilary Term (complete) Department of Computer Science, Oxford University
Information Hiding (complete) Andrew D. Ker 10 Lectures, Hilary Term 2016 Department of Computer Science, Oxford University ii Contents 0 Introduction 1 0.1 Preliminary Material..............................
More informationChapter 2 Signal Processing at Receivers: Detection Theory
Chapter Signal Processing at Receivers: Detection Theory As an application of the statistical hypothesis testing, signal detection plays a key role in signal processing at receivers of wireless communication
More informationMachine Learning Basics Lecture 7: Multiclass Classification. Princeton University COS 495 Instructor: Yingyu Liang
Machine Learning Basics Lecture 7: Multiclass Classification Princeton University COS 495 Instructor: Yingyu Liang Example: image classification indoor Indoor outdoor Example: image classification (multiclass)
More informationFundamental Limits of Invisible Flow Fingerprinting
Fundamental Limits of Invisible Flow Fingerprinting Ramin Soltani, Dennis Goeckel, Don Towsley, and Amir Houmansadr Electrical and Computer Engineering Department, University of Massachusetts, Amherst,
More informationDefect Detection Using Hidden Markov Random Fields
Electrical and Computer Engineering Publications Electrical and Computer Engineering 5 Defect Detection Using Hidden Markov Random Fields Aleksandar Dogandžić Iowa State University, ald@iastate.edu Nawanat
More informationBayes Correlated Equilibrium and Comparing Information Structures
Bayes Correlated Equilibrium and Comparing Information Structures Dirk Bergemann and Stephen Morris Spring 2013: 521 B Introduction game theoretic predictions are very sensitive to "information structure"
More informationOn Noise-Enhanced Distributed Inference in the Presence of Byzantines
Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 211 On Noise-Enhanced Distributed Inference in the Presence of Byzantines Mukul Gagrani
More informationBayesian Methods: Naïve Bayes
Bayesian Methods: aïve Bayes icholas Ruozzi University of Texas at Dallas based on the slides of Vibhav Gogate Last Time Parameter learning Learning the parameter of a simple coin flipping model Prior
More informationObtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability
Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Anindya Sarkar, Kaushal Solanki and and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationML Detection of Steganography
ML Detection of Steganography Mark T Hogan, Neil J Hurley, Guénolé CM Silvestre, Félix Balado and Kevin M Whelan Department of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland ABSTRACT
More informationLearning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding
Learning outcomes Palettes and GIF CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Learn how images are represented using a palette Get an overview of hiding techniques in
More informationMPSteg-color: a new steganographic technique for color images
MPSteg-color: a new steganographic technique for color images Giacomo Cancelli, Mauro Barni Università degli Studi di Siena Dipartimento di Ingegneria dell Informazione, Italy {cancelli,barni}@dii.unisi.it
More informationNEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION
NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION Sos S. Agaian 1 and Juan P. Perez 2 1NSP Lab, The University of Texas at San Antonio, Electrical Engineering Department,
More informationConfronting Theory with Experimental Data and vice versa. Lecture VII Social learning. The Norwegian School of Economics Nov 7-11, 2011
Confronting Theory with Experimental Data and vice versa Lecture VII Social learning The Norwegian School of Economics Nov 7-11, 2011 Quantal response equilibrium (QRE) Players do not choose best response
More informationCONTENT ADAPTIVE STEGANOGRAPHY DESIGN AND DETECTION
CONTENT ADAPTIVE STEGANOGRAPHY DESIGN AND DETECTION BY VOJTĚCH HOLUB MS, Czech Technical University, Prague, 2010 DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor
More informationSpring 2016 Network Science. Solution of Quiz I
Spring 2016 Network Science Department of Electrical and Computer Engineering National Chiao Tung University Solution of Quiz I Problem Points Your Score 1 5 2 20 25 20 Total 100 Read all of the following
More informationMULTIMEDIA forensics [1] is a new discipline aiming
450 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCH 2013 The Source Identification Game: An Information-Theoretic Perspective Mauro Barni, Fellow, IEEE, and Benedetta Tondi
More informationThis exam contains 13 pages (including this cover page) and 10 questions. A Formulae sheet is provided with the exam.
Probability and Statistics FS 2017 Session Exam 22.08.2017 Time Limit: 180 Minutes Name: Student ID: This exam contains 13 pages (including this cover page) and 10 questions. A Formulae sheet is provided
More informationAsymptotically Truthful Equilibrium Selection in Large Congestion Games
Asymptotically Truthful Equilibrium Selection in Large Congestion Games Ryan Rogers - Penn Aaron Roth - Penn June 12, 2014 Related Work Large Games Roberts and Postlewaite 1976 Immorlica and Mahdian 2005,
More informationChapter 20. Deep Generative Models
Peng et al.: Deep Learning and Practice 1 Chapter 20 Deep Generative Models Peng et al.: Deep Learning and Practice 2 Generative Models Models that are able to Provide an estimate of the probability distribution
More informationResearch Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number
Applied Mathematics Volume 013, Article ID 189706, 8 pages http://dx.doi.org/10.1155/013/189706 Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number
More informationSTEGOSYSTEMS BASED ON NOISY CHANNELS
International Journal of Computer Science and Applications c Technomathematics Research Foundation Vol. 8 No. 1, pp. 1-13, 011 STEGOSYSTEMS BASED ON NOISY CHANNELS VALERY KORZHIK State University of Telecommunications,
More informationChapter 2. Binary and M-ary Hypothesis Testing 2.1 Introduction (Levy 2.1)
Chapter 2. Binary and M-ary Hypothesis Testing 2.1 Introduction (Levy 2.1) Detection problems can usually be casted as binary or M-ary hypothesis testing problems. Applications: This chapter: Simple hypothesis
More informationSealed-bid first-price auctions with an unknown number of bidders
Sealed-bid first-price auctions with an unknown number of bidders Erik Ekström Department of Mathematics, Uppsala University Carl Lindberg The Second Swedish National Pension Fund e-mail: ekstrom@math.uu.se,
More informationFake news. Xiaofan Li & Andrew Whinston. University of Texas at Austin December 30, 2017
Fake news Xiaofan Li & Andrew Whinston University of Texas at Austin li.x@utexas.edu December 30, 2017 Xiaofan Li & Andrew Whinston (UT Austin) Fake news December 30, 2017 1 / 23 Overview 1 Introduction
More informationModern Methods of Data Analysis - WS 07/08
Modern Methods of Data Analysis Lecture VIc (19.11.07) Contents: Maximum Likelihood Fit Maximum Likelihood (I) Assume N measurements of a random variable Assume them to be independent and distributed according
More informationDirection: This test is worth 250 points and each problem worth points. DO ANY SIX
Term Test 3 December 5, 2003 Name Math 52 Student Number Direction: This test is worth 250 points and each problem worth 4 points DO ANY SIX PROBLEMS You are required to complete this test within 50 minutes
More informationNew Steganographic scheme based of Reed- Solomon codes
New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;
More informationGenerative Adversarial Networks. Presented by Yi Zhang
Generative Adversarial Networks Presented by Yi Zhang Deep Generative Models N(O, I) Variational Auto-Encoders GANs Unreasonable Effectiveness of GANs GANs Discriminator tries to distinguish genuine data
More informationConstructing good covering codes for applications in Steganography
Constructing good covering codes for applications in Steganography Jürgen Bierbrauer 1 and Jessica Fridrich 2 1 Department of Mathematical Sciences Michigan Technological University HOUGHTON (MI) 49931
More informationExtensive Form Games I
Extensive Form Games I Definition of Extensive Form Game a finite game tree X with nodes x X nodes are partially ordered and have a single root (minimal element) terminal nodes are z Z (maximal elements)
More informationOverview. Producer Theory. Consumer Theory. Exchange
Overview Consumer Producer Exchange Edgeworth Box All Possible Exchange Points Contract Curve Overview Consumer Producer Exchange (Multiplicity) Walrasian Equilibrium Walrasian Equilibrium Requirements:
More informationGame Theory, Population Dynamics, Social Aggregation. Daniele Vilone (CSDC - Firenze) Namur
Game Theory, Population Dynamics, Social Aggregation Daniele Vilone (CSDC - Firenze) Namur - 18.12.2008 Summary Introduction ( GT ) General concepts of Game Theory Game Theory and Social Dynamics Application:
More informationThe peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker.
Lecture 6. SG based on noisy channels [4]. CO Detection of SG The peculiarities of the model: - it is alloed to use by attacker only noisy version of SG C (n), - CO can be knon exactly for attacker. Practical
More informationProceedings of the 9th Hungarian-Japanese Symposium on Discrete Mathematics and Its Applications June 2-5, 2015, Fukuoka, Japan
Proceedings of the 9th Hungarian-Japanese Symposium on Discrete Mathematics and Its Applications June 2-5, 205, Fuuoa, Japan Editors: Satoru Iwata Department of Mathematical Informatics University of Toyo
More informationECE531 Screencast 9.2: N-P Detection with an Infinite Number of Possible Observations
ECE531 Screencast 9.2: N-P Detection with an Infinite Number of Possible Observations D. Richard Brown III Worcester Polytechnic Institute Worcester Polytechnic Institute D. Richard Brown III 1 / 7 Neyman
More informationDetection Games with a Fully Active Attacker
Detection Games with a Fully Active Attacker Benedetta Tondi 1, Mauro Barni 1, Neri Merhav 2 1 Department of Information Engineering and Mathematics, University of Siena, Siena, ITALY 2 Department of Electrical
More informationSTAT/MATH 395 PROBABILITY II
STAT/MATH 395 PROBABILITY II Chapter 6 : Moment Functions Néhémy Lim 1 1 Department of Statistics, University of Washington, USA Winter Quarter 2016 of Common Distributions Outline 1 2 3 of Common Distributions
More informationExpectation Maximization
Expectation Maximization Bishop PRML Ch. 9 Alireza Ghane c Ghane/Mori 4 6 8 4 6 8 4 6 8 4 6 8 5 5 5 5 5 5 4 6 8 4 4 6 8 4 5 5 5 5 5 5 µ, Σ) α f Learningscale is slightly Parameters is slightly larger larger
More informationThe Multi-Arm Bandit Framework
The Multi-Arm Bandit Framework A. LAZARIC (SequeL Team @INRIA-Lille) ENS Cachan - Master 2 MVA SequeL INRIA Lille MVA-RL Course In This Lecture A. LAZARIC Reinforcement Learning Algorithms Oct 29th, 2013-2/94
More informationPerturbed Quantization Steganography
Perturbed Quantization Steganography Jessica Fridrich SUNY Binghamton Department of ECE Binghamton, NY 13902-6000 001 607 777 2577 fridrich@binghamton.edu Miroslav Goljan SUNY Binghamton Department of
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationExpectation Maximization
Expectation Maximization Seungjin Choi Department of Computer Science and Engineering Pohang University of Science and Technology 77 Cheongam-ro, Nam-gu, Pohang 37673, Korea seungjin@postech.ac.kr 1 /
More informationPhotos placed in horizontal position with even amount of white space between photos and header
Photos placed in horizontal position with even amount of white space between photos and header XPCA: Copula-based Decompositions for Ordinal Data Clifford Anderson-Bergman, Kina Kincher-Winoto and Tamara
More informationUSING MULTIPLE RE-EMBEDDINGS FOR QUANTITATIVE STEGANALYSIS AND IMAGE RELIABILITY ESTIMATION
TKK Reports in Information and Computer Science Espoo 2010 TKK-ICS-R34 USING MULTIPLE RE-EMBEDDINGS FOR QUANTITATIVE STEGANALYSIS AND IMAGE RELIABILITY ESTIMATION Yoan Miche, Patrick Bas and Amaury Lendasse
More informationLong-Run versus Short-Run Player
Repeated Games 1 Long-Run versus Short-Run Player a fixed simultaneous move stage game Player 1 is long-run with discount factor δ actions a A a finite set 1 1 1 1 2 utility u ( a, a ) Player 2 is short-run
More informationExponential Family and Maximum Likelihood, Gaussian Mixture Models and the EM Algorithm. by Korbinian Schwinger
Exponential Family and Maximum Likelihood, Gaussian Mixture Models and the EM Algorithm by Korbinian Schwinger Overview Exponential Family Maximum Likelihood The EM Algorithm Gaussian Mixture Models Exponential
More informationA Few Notes on Fisher Information (WIP)
A Few Notes on Fisher Information (WIP) David Meyer dmm@{-4-5.net,uoregon.edu} Last update: April 30, 208 Definitions There are so many interesting things about Fisher Information and its theoretical properties
More informationGaussian Process Approximations of Stochastic Differential Equations
Gaussian Process Approximations of Stochastic Differential Equations Cédric Archambeau Dan Cawford Manfred Opper John Shawe-Taylor May, 2006 1 Introduction Some of the most complex models routinely run
More informationThe Expectation Maximization or EM algorithm
The Expectation Maximization or EM algorithm Carl Edward Rasmussen November 15th, 2017 Carl Edward Rasmussen The EM algorithm November 15th, 2017 1 / 11 Contents notation, objective the lower bound functional,
More informationIf there exists a threshold k 0 such that. then we can take k = k 0 γ =0 and achieve a test of size α. c 2004 by Mark R. Bell,
Recall The Neyman-Pearson Lemma Neyman-Pearson Lemma: Let Θ = {θ 0, θ }, and let F θ0 (x) be the cdf of the random vector X under hypothesis and F θ (x) be its cdf under hypothesis. Assume that the cdfs
More informationGame Theory. Solutions to Problem Set 4
1 Hotelling s model 1.1 Two vendors Game Theory Solutions to Problem Set 4 Consider a strategy pro le (s 1 s ) with s 1 6= s Suppose s 1 < s In this case, it is pro table to for player 1 to deviate and
More informationStatistics, Data Analysis, and Simulation SS 2013
Statistics, Data Analysis, and Simulation SS 2013 08.128.730 Statistik, Datenanalyse und Simulation Dr. Michael O. Distler Mainz, May 21, 2013 3. Parameter estimation 1 Consistency:
More informationIntroduction to Statistical Learning Theory
Introduction to Statistical Learning Theory In the last unit we looked at regularization - adding a w 2 penalty. We add a bias - we prefer classifiers with low norm. How to incorporate more complicated
More informationAn IDL Based Image Deconvolution Software Package
An IDL Based Image Deconvolution Software Package F. Városi and W. B. Landsman Hughes STX Co., Code 685, NASA/GSFC, Greenbelt, MD 20771 Abstract. Using the Interactive Data Language (IDL), we have implemented
More informationDIGITAL image processing has remarkably developed
IEEE TRANSACTION ON IMAGE PROCESSING SUBMITTED VERSION, OCT. 3 Statistical Model of Quantized DCT Coefficients : Application in the Steganalysis of Jsteg Algorithm Thanh Hai Thai, Rémi Cogranne, Florent
More informationLecture 7 Introduction to Statistical Decision Theory
Lecture 7 Introduction to Statistical Decision Theory I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw December 20, 2016 1 / 55 I-Hsiang Wang IT Lecture 7
More informationDistributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks
Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Marco Moretti, Andrea Abrardo Dipartimento di Ingegneria dell Informazione, University of Pisa, Italy
More information