Learn More
An information–theoretic analysis of information hiding is presented in this paper, forming the theoretical basis for design of information–hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, and steganography. In these applications,(More)
Biological and machine pattern recognition systems face a common challenge: Given sensory data about an unknown object, classify the object by comparing the sensory data with a library of internal representations stored in memory. In many cases of interest, the number of patterns to be discriminated and the richness of the raw data force recognition systems(More)
Iterative deblurring methods using the expectation maximization (EM) formulation and the algebraic reconstruction technique (ART), respectively, are adapted for metal artifact reduction in medical computed tomography (CT). In experiments with synthetic noise-free and additive noisy projection data of dental phantoms, it is found that both simultaneous(More)
Proposes a framework for simultaneous detection, tracking, and recognition of objects via data fused from multiple sensors. Complex dynamic scenes are represented via the concatenation of simple rigid templates. The variability of the infinity of pose is accommodated via the actions of matrix Lie groups extending the templates to individual instances. The(More)
We continue our study of the inverse scattering problem for diffuse light. In contrast to our earlier work, in which we considered the linear inverse problem, we now consider the nonlinear problem. We obtain a solution to this problem in the form of a functional series expansion. The first term in this expansion is the pseudoinverse of the linearized(More)
Wireless sensor networks often face the critical challenge of sustaining long-term operation on limited battery energy. Coverage maintenance protocols can effectively prolong network lifetime by maintaining sufficient sensing coverage over a region using a small number of active nodes while scheduling the others to sleep. We present a novel distributed(More)