Abstract: A well-known data hiding scheme, Remainder with Threshold substitution (RT), is analyzed. RT uses a threshold value, T, and two moduli numbers, mu, and ml, ml ...
Abstract: Approximate solutions to the Witsenhausen counterexample (1968) are derived by constraining the unknown control functions to take on fixed structures containing "free" parameters to be ...