Journal articles on the topic 'Embedding a vector of bits'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Embedding a vector of bits.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yang, Zekun, and Juan Feng. "A Causal Inference Method for Reducing Gender Bias in Word Embedding Relations." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 9434–41. http://dx.doi.org/10.1609/aaai.v34i05.6486.
Full textLee, Jiann-Der, Yaw-Hwang Chiou, and Jing-Ming Guo. "Reversible Data Hiding Scheme with High Embedding Capacity Using Semi-Indicator-Free Strategy." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/476181.
Full textD R, Vinay, and Ananda Babu J. "A Novel Secure Data Hiding Technique into Video Sequences Using RVIHS." International Journal of Computer Network and Information Security 13, no. 2 (April 8, 2021): 53–65. http://dx.doi.org/10.5815/ijcnis.2021.02.05.
Full textLauscher, Anne, Goran Glavaš, Simone Paolo Ponzetto, and Ivan Vulić. "A General Framework for Implicit and Explicit Debiasing of Distributional Word Vector Spaces." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 8131–38. http://dx.doi.org/10.1609/aaai.v34i05.6325.
Full textTissier, Julien, Christophe Gravier, and Amaury Habrard. "Near-Lossless Binarization of Word Embeddings." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 7104–11. http://dx.doi.org/10.1609/aaai.v33i01.33017104.
Full textK., Akubuilo, and Rix Torimiro. "LARGE DATA EMBEDDING; PROBLEM & SOLUTION." Engineering Science & Technology Journal 1, no. 2 (December 29, 2019): 18–22. http://dx.doi.org/10.51594/estj.v1i2.114.
Full textCao, Fang, Yujie Fu, Heng Yao, Mian Zou, Jian Li, and Chuan Qin. "Separable Reversible Data Hiding in Encrypted VQ-Encoded Images." Security and Communication Networks 2022 (April 23, 2022): 1–16. http://dx.doi.org/10.1155/2022/1227926.
Full textSubramanian, Maheswari, and Reeba Korah. "A Framework of Secured Embedding Scheme Using Vector Discrete Wavelet Transformation and Lagrange Interpolation." Journal of Computer Networks and Communications 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/8695103.
Full textTang, Chun Ge, Tie Sheng Fan, Lei Liu, and Zhi Hui Li. "Blind Digital Image Watermarking Algorithm Based on the Chain Code." Advanced Materials Research 546-547 (July 2012): 410–15. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.410.
Full textVoyiatzis, Ioannis. "A Low-Cost BIST Scheme for Test Vector Embedding in Accumulator-Generated Sequences." VLSI Design 2008 (March 17, 2008): 1–8. http://dx.doi.org/10.1155/2008/680157.
Full textHou, Xiang, Lianquan Min, and Hui Yang. "A Reversible Watermarking Scheme for Vector Maps Based on Multilevel Histogram Modification." Symmetry 10, no. 9 (September 12, 2018): 397. http://dx.doi.org/10.3390/sym10090397.
Full textGong, Cheng, Jingbing Li, Uzair Aslam Bhatti, Ming Gong, Jixin Ma, and Mengxing Huang. "Robust and Secure Zero-Watermarking Algorithm for Medical Images Based on Harris-SURF-DCT and Chaotic Map." Security and Communication Networks 2021 (November 3, 2021): 1–13. http://dx.doi.org/10.1155/2021/3084153.
Full textNematollahi, Mohammad Ali, Chalee Vorakulpipat, and Hamurabi Gamboa Rosales. "Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/5454768.
Full textKang, Jinwoo, Hyunjung Kim, and Sang-ug Kang. "Genuine Reversible Data Hiding Technique for H.264 Bitstream Using Multi-Dimensional Histogram Shifting Technology on QDCT Coefficients." Applied Sciences 10, no. 18 (September 14, 2020): 6410. http://dx.doi.org/10.3390/app10186410.
Full textKumar, Vaibhav, Tenzin Singhay Bhotia, Vaibhav Kumar, and Tanmoy Chakraborty. "Nurse is Closer to Woman than Surgeon? Mitigating Gender-Biased Proximities in Word Embeddings." Transactions of the Association for Computational Linguistics 8 (August 2020): 486–503. http://dx.doi.org/10.1162/tacl_a_00327.
Full textJasim, Abbas. "Image Hiding Using Variable Length Least Significant Bits Embedding." Iraqi Journal for Electrical and Electronic Engineering 10, no. 1 (June 1, 2014): 15–23. http://dx.doi.org/10.37917/ijeee.10.1.2.
Full textSao, Nguyen Kim, Nguyen Ngoc Hoa, and Pham Van At. "AN EFFECTIVE REVERSIBLE DATA HIDING METHOD BASED ON PIXEL-VALUE-ORDERING." Journal of Computer Science and Cybernetics 36, no. 2 (May 11, 2020): 139–58. http://dx.doi.org/10.15625/1813-9663/36/2/14084.
Full textGALKA, ANDREAS, and GERD PFISTER. "DYNAMICAL CORRELATIONS ON RECONSTRUCTED INVARIANT DENSITIES AND THEIR EFFECT ON CORRELATION DIMENSION ESTIMATION." International Journal of Bifurcation and Chaos 13, no. 03 (March 2003): 723–32. http://dx.doi.org/10.1142/s0218127403006881.
Full textUlčar, Matej, Anka Supej, Marko Robnik-Šikonja, and Senja Pollak. "Slovene and Croatian word embeddings in terms of gender occupational analogies." Slovenščina 2.0: empirical, applied and interdisciplinary research 9, no. 1 (July 6, 2021): 26–59. http://dx.doi.org/10.4312/slo2.0.2021.1.26-59.
Full textYang, Jun De, Zhong Ping Luo, Fan Lu, and Yuan Wang. "Research on Embedding Strength of Diamond." Key Engineering Materials 480-481 (June 2011): 560–67. http://dx.doi.org/10.4028/www.scientific.net/kem.480-481.560.
Full textBray, Elizabeth. "Fixing and Embedding Protocol for Octocorals and Their Sclerites." Microscopy Today 9, no. 2 (March 2001): 33. http://dx.doi.org/10.1017/s1551929500056467.
Full textXiao, Hong, and Panchi Li. "Quantum steganography based on reflected gray code for color images." Intelligent Decision Technologies 14, no. 3 (September 29, 2020): 291–312. http://dx.doi.org/10.3233/idt-190034.
Full textSaini, Mangat, and Pratibha. "A Review on Various Approaches of Image Steganography and Data Security." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (January 30, 2018): 102. http://dx.doi.org/10.23956/ijarcsse.v8i1.532.
Full textZakaria, Abdul, Mehdi Hussain, Ainuddin Wahab, Mohd Idris, Norli Abdullah, and Ki-Hyun Jung. "High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution." Applied Sciences 8, no. 11 (November 9, 2018): 2199. http://dx.doi.org/10.3390/app8112199.
Full textYongjun, Kong, Zhang Minqing, Wang Zexi, Ke Yan, and Huang Siyuan. "Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process." Security and Communication Networks 2022 (May 12, 2022): 1–17. http://dx.doi.org/10.1155/2022/6299469.
Full textWang, Haoye, Xin Xia, David Lo, Qiang He, Xinyu Wang, and John Grundy. "Context-aware Retrieval-based Deep Commit Message Generation." ACM Transactions on Software Engineering and Methodology 30, no. 4 (July 2021): 1–30. http://dx.doi.org/10.1145/3464689.
Full textTiwari, Dhananjay. "Improving signal-to-noise ratio of magnetic tunnel junction based radio frequency detector via spin-torque ferromagnetic resonance." Review of Scientific Instruments 93, no. 5 (May 1, 2022): 053904. http://dx.doi.org/10.1063/5.0087860.
Full textKer, Andrew D. "Steganalysis of Embedding in Two Least-Significant Bits." IEEE Transactions on Information Forensics and Security 2, no. 1 (March 2007): 46–54. http://dx.doi.org/10.1109/tifs.2006.890519.
Full textWang, Jijun, and Soo Fun Tan. "Separable Reversible Data Hiding in Encryption Image with Two-Tuples Coding." Computers 10, no. 7 (July 7, 2021): 86. http://dx.doi.org/10.3390/computers10070086.
Full textZhou, RiGui, YouDe Cheng, Hou Ian, and XingAo Liu. "Quantum watermarking algorithm based on chaotic affine scrambling." International Journal of Quantum Information 17, no. 04 (June 2019): 1950038. http://dx.doi.org/10.1142/s0219749919500382.
Full textYu, Lifang, Yun Q. Shi, Yao Zhao, Rongrong Ni, and Gang Cao. "A Study on Embedding Efficiency of Matrix Encoding." International Journal of Digital Crime and Forensics 4, no. 1 (January 2012): 37–48. http://dx.doi.org/10.4018/jdcf.2012010103.
Full textSwain, Gandharba, and Saroj Kumar Lenka. "A Robust Image Steganography Technique Using Dynamic Embedding with Two Least Significant Bits." Advanced Materials Research 403-408 (November 2011): 835–41. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.835.
Full textTian, Hui, Jie Qin, Yongfeng Huang, Xu An Wang, Jin Liu, Yonghong Chen, Tian Wang, and Yiqiao Cai. "A High-Capacity Covering Code for Voice-Over-IP Steganography." International Journal of Information Technology and Web Engineering 10, no. 3 (July 2015): 46–63. http://dx.doi.org/10.4018/ijitwe.2015070104.
Full textLee, Chin-Feng, Jau-Ji Shen, Somya Agrawal, and Yen-Hsi Li. "High-Capacity Embedding Method Based on Double-Layer Octagon-Shaped Shell Matrix." Symmetry 13, no. 4 (April 1, 2021): 583. http://dx.doi.org/10.3390/sym13040583.
Full textTieqiao Liu, Jishun Kuang, Weizheng Wang, Zhiqiang You, and Shuo Cai. "Embedding N-Detect Test Set into Controlled Bits Stream." International Journal of Digital Content Technology and its Applications 5, no. 10 (October 31, 2011): 271–78. http://dx.doi.org/10.4156/jdcta.vol5.issue10.31.
Full textYang, Chunfang, Fenlin Liu, Xiangyang Luo, and Bin Liu. "Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits." IEEE Transactions on Information Forensics and Security 3, no. 4 (December 2008): 662–72. http://dx.doi.org/10.1109/tifs.2008.2007240.
Full textA. Jasim, Abbas. "Image Hiding Using Variable Length Least Significant Bits Embedding." Iraqi Journal for Electrical And Electronic Engineering 10, no. 1 (June 28, 2014): 15–23. http://dx.doi.org/10.33762/eeej.2014.93014.
Full textAdi, Prajanto Wahyu, Yani Parti Astuti, and Egia Rosi Subhiyakto. "Feature Image Watermarking Based on Bicubic Interpolation of Wavelet Coefficients Using CRT." CommIT (Communication and Information Technology) Journal 11, no. 2 (October 31, 2017): 93. http://dx.doi.org/10.21512/commit.v11i2.3870.
Full textLiang, Zhuoqian, Bingwen Feng, Xuba Xu, Xiaotian Wu, and Tao Yang. "Geometrically Invariant Image Watermarking Using Histogram Adjustment." International Journal of Digital Crime and Forensics 10, no. 1 (January 2018): 54–66. http://dx.doi.org/10.4018/ijdcf.2018010105.
Full textLee, Chin-Feng, and Hua-Zhe Wu. "High-Capacity and High-Quality Reversible Data Hiding Method Using Recurrent Round-Trip Embedding Strategy in the Quotient Image." Applied Sciences 11, no. 21 (October 29, 2021): 10157. http://dx.doi.org/10.3390/app112110157.
Full textKhan, Sahib, Khalil Khan, Farman Ali, and Kyung-Sup Kwak. "Forgery Detection and Localization of Modifications at the Pixel Level." Symmetry 12, no. 1 (January 9, 2020): 137. http://dx.doi.org/10.3390/sym12010137.
Full textZhang, Wen-Rong, and Yuh-Ming Huang. "An Improved Product Code-Based Data Hiding Scheme." Applied Sciences 8, no. 11 (November 1, 2018): 2119. http://dx.doi.org/10.3390/app8112119.
Full textWang, Dewang, Xianquan Zhang, Chunqiang Yu, and Zhenjun Tang. "Reversible Data Hiding in Encrypted Image Based on Multi-MSB Embedding Strategy." Applied Sciences 10, no. 6 (March 18, 2020): 2058. http://dx.doi.org/10.3390/app10062058.
Full textXia, Xue Wen, Zeng Gang Xiong, and Zhi Ming Li. "Self-Embedding Watermark for Image Restoration Based on Repeat Correcting Code." Advanced Materials Research 219-220 (March 2011): 66–70. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.66.
Full textHasmawati, Hasmawati, and Ari Moesriami Barmawi. "Increasing The Capacity of Headstega Based on Bitwise Operation." Jurnal Ilmu Komputer dan Informasi 14, no. 2 (July 4, 2021): 113–26. http://dx.doi.org/10.21609/jiki.v14i2.957.
Full textClark, T. E., S. T. Love, Muneto Nitta, T. ter Veldhuis, and Chi Xiong. "Brane vector dynamics from embedding geometry." Nuclear Physics B 810, no. 1-2 (March 2009): 97–114. http://dx.doi.org/10.1016/j.nuclphysb.2008.10.017.
Full textLee, Kong Aik, Qiongqiong Wang, and Takafumi Koshinaka. "Xi-Vector Embedding for Speaker Recognition." IEEE Signal Processing Letters 28 (2021): 1385–89. http://dx.doi.org/10.1109/lsp.2021.3091932.
Full textKim, Cheonshik, Ching-Nung Yang, and Lu Leng. "High-Capacity Data Hiding for ABTC-EQ Based Compressed Image." Electronics 9, no. 4 (April 14, 2020): 644. http://dx.doi.org/10.3390/electronics9040644.
Full textXin, Guojiang, Yuling Liu, Ting Yang, and Yu Cao. "An Adaptive Audio Steganography for Covert Wireless Communication." Security and Communication Networks 2018 (August 16, 2018): 1–10. http://dx.doi.org/10.1155/2018/7096271.
Full textBoostani, R., and M. Sabeti. "MULTI-CHANNEL ECG-BASED STEGANOGRAPHY." Biomedical Engineering: Applications, Basis and Communications 30, no. 06 (November 29, 2018): 1850046. http://dx.doi.org/10.4015/s1016237218500461.
Full text