Journal articles on the topic 'Low-distortion embedding'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Low-distortion embedding.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Castermans, Thom, Kevin Verbeek, Bettina Speckmann, Michel A. Westenberg, Rob Koopman, Shenghui Wang, Hein van den Berg, and Arianna Betti. "SolarView: Low Distortion Radial Embedding with a Focus." IEEE Transactions on Visualization and Computer Graphics 25, no. 10 (October 1, 2019): 2969–82. http://dx.doi.org/10.1109/tvcg.2018.2865361.
Full textShih, Frank Y., and Xin Zhong. "Intelligent Watermarking for High-Capacity Low-Distortion Data Embedding." International Journal of Pattern Recognition and Artificial Intelligence 30, no. 05 (April 21, 2016): 1654003. http://dx.doi.org/10.1142/s0218001416540033.
Full textLi, Wan Qi, Heng Wang, Che Nian, Huang Wei, and Hong Yao You. "Minimizing the Embedding Impact Using Network Flow Algorithms." Advanced Materials Research 341-342 (September 2011): 478–83. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.478.
Full textNguyen, Dinh-Chien, Thai-Son Nguyen, Chin-Chen Chang, Huan-Sheng Hsueh, and Fang-Rong Hsu. "High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift." Security and Communication Networks 2018 (August 1, 2018): 1–11. http://dx.doi.org/10.1155/2018/2029869.
Full textHu, Yongjin, Xiyan Li, and Jun Ma. "A Novel LSB Matching Algorithm Based on Information Pre-Processing." Mathematics 10, no. 1 (December 21, 2021): 8. http://dx.doi.org/10.3390/math10010008.
Full textWang, Ruosong, and David P. Woodruff. "Tight Bounds for ℓ 1 Oblivious Subspace Embeddings." ACM Transactions on Algorithms 18, no. 1 (January 31, 2022): 1–32. http://dx.doi.org/10.1145/3477537.
Full textZhang, Shun, Liang Yang, Xihao Xu, and Tiegang Gao. "Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System." International Journal of Digital Crime and Forensics 10, no. 1 (January 2018): 40–53. http://dx.doi.org/10.4018/ijdcf.2018010104.
Full textYang, Yuhang, Xuyu Xiang, Jiaohua Qin, Yun Tan, Zhangdong Wang, and Yajie Liu. "High-Embedded Low-Distortion Multihistogram Shift Video Reversible Data Hiding Based on DCT Coefficient." Electronics 12, no. 7 (March 31, 2023): 1652. http://dx.doi.org/10.3390/electronics12071652.
Full textTsai, Yuan-Yu, Yao-Hsien Huang, Ruo-Jhu Lin, and Chi-Shiang Chan. "An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting." International Journal of Digital Crime and Forensics 8, no. 2 (April 2016): 48–61. http://dx.doi.org/10.4018/ijdcf.2016040105.
Full textWu, Nan-I., Kuo-Chen Wu, and Chung-Ming Wang. "Exploring pixel-value differencing and base decomposition for low distortion data embedding." Applied Soft Computing 12, no. 2 (February 2012): 942–60. http://dx.doi.org/10.1016/j.asoc.2011.09.002.
Full textChari, Tara, and Lior Pachter. "The specious art of single-cell genomics." PLOS Computational Biology 19, no. 8 (August 17, 2023): e1011288. http://dx.doi.org/10.1371/journal.pcbi.1011288.
Full textYin, Te Lung, and Xu Ren Luo. "Reversible Data Hiding Exploiting Coefficients Histogram in Wavelet Transform Domain." Applied Mechanics and Materials 284-287 (January 2013): 3164–67. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3164.
Full textPan, Yi-Lun, and Ja-Ling Wu. "Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images." Entropy 24, no. 7 (July 15, 2022): 982. http://dx.doi.org/10.3390/e24070982.
Full textTsai, Yuan-Yu, Yu-Shiou Tsai, and Chia-Chun Chang. "An Effective Authentication Algorithm for Polygonal Models with High Embedding Capacity." Symmetry 10, no. 7 (July 18, 2018): 290. http://dx.doi.org/10.3390/sym10070290.
Full textMa, Bin, Xiao-Yu Wang, and Bing Li. "A New Kind of High Capacity and Security Reversible Data Hiding Scheme." International Journal of Digital Crime and Forensics 11, no. 4 (October 2019): 118–29. http://dx.doi.org/10.4018/ijdcf.2019100108.
Full textChen, HaiShan, Jinye Wang, Yiqing Zhou, TingCheng Chang, KunQuan Shi, and JunYing Yuan. "Improving the Security of Reversible Data Hiding Using Multiple Histogram Modification." Mathematical Problems in Engineering 2022 (January 18, 2022): 1–12. http://dx.doi.org/10.1155/2022/7192697.
Full textJuarez-Sandoval, Oswaldo Ulises, Laura Josefina Reyes-Ruiz, Francisco Garcia-Ugalde, Manuel Cedillo-Hernandez, Jazmin Ramirez-Hernandez, and Robert Morelos-Zaragoza. "Additional Information Delivery to Image Content via Improved Unseen–Visible Watermarking." Electronics 10, no. 18 (September 7, 2021): 2186. http://dx.doi.org/10.3390/electronics10182186.
Full textJin, Liu, and Yiwen Zhang. "An Improved NID Steganography Method for Low Bitrate Speech on VoIP." Modern Electronic Technology 5, no. 1 (May 6, 2021): 1. http://dx.doi.org/10.26549/met.v5i1.6167.
Full textTsai, Yuan-Yu, Tsung-Chieh Cheng, and Yao-Hsien Huang. "A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/1096463.
Full textKim, Cheonshik, Dong-Kyoo Shin, Ching-Nung Yang, and Lu Leng. "Hybrid Data Hiding Based on AMBTC Using Enhanced Hamming Code." Applied Sciences 10, no. 15 (August 2, 2020): 5336. http://dx.doi.org/10.3390/app10155336.
Full textLi, Jian Yong, Yan Qiu Yang, Qi Liang Tang, and Tong Wang. "A Watermarking of Two Dimensions Based on DCT." Applied Mechanics and Materials 263-266 (December 2012): 2901–5. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2901.
Full textWang, Jen-Tse, Yi-Ching Chang, Chun-Yuan Yu, and Shyr-Shen Yu. "Hamming Code Based Watermarking Scheme for 3D Model Verification." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/241093.
Full textLeng, Hui-Shih. "Generalized Scheme Based on Octagon-Shaped Shell for Data Hiding in Steganographic Applications." Symmetry 11, no. 6 (June 4, 2019): 760. http://dx.doi.org/10.3390/sym11060760.
Full textPang, LieLin, KokSheik Wong, Yiqi Tew, and Susanto Rahardja. "Data Embedding in SHVC Video Using Threshold-Controlled Block Splitting." Applied Sciences 11, no. 11 (May 25, 2021): 4850. http://dx.doi.org/10.3390/app11114850.
Full textZhao, Shuai, Jifeng Sun, Hongshi Ou, and Yibin Lin. "A Novel Multi-Task Face Super-Resolution Framework Embedding Degraded Augmented GAN Networks." Journal of Physics: Conference Series 2303, no. 1 (July 1, 2022): 012061. http://dx.doi.org/10.1088/1742-6596/2303/1/012061.
Full textChen, Weitong, Na Ren, Changqing Zhu, Qifei Zhou, Tapio Seppänen, and Anja Keskinarkaus. "Screen-Cam Robust Image Watermarking with Feature-Based Synchronization." Applied Sciences 10, no. 21 (October 25, 2020): 7494. http://dx.doi.org/10.3390/app10217494.
Full textYongjun, Kong, Zhang Minqing, Wang Zexi, Ke Yan, and Huang Siyuan. "Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process." Security and Communication Networks 2022 (May 12, 2022): 1–17. http://dx.doi.org/10.1155/2022/6299469.
Full textMaity, Hirak Kumar, and Santi P. Maity. "FPGA Implementation for Modified RCM-RW on Digital Images." Journal of Circuits, Systems and Computers 26, no. 03 (November 21, 2016): 1750044. http://dx.doi.org/10.1142/s021812661750044x.
Full textChen, Tzung-Her, and Jing-Ya Yan. "Enhanced Steganography for High Dynamic Range Images with Improved Security and Capacity." Applied Sciences 13, no. 15 (August 1, 2023): 8865. http://dx.doi.org/10.3390/app13158865.
Full textTan, Xiu Hu. "A Blind Watermarking Method Based on Space Reconstruction." Applied Mechanics and Materials 444-445 (October 2013): 712–16. http://dx.doi.org/10.4028/www.scientific.net/amm.444-445.712.
Full textHuang, Dan, and Fangjun Huang. "Reversible Data Hiding Based on Adaptive Block Selection Strategy." International Journal of Digital Crime and Forensics 12, no. 1 (January 2020): 157–68. http://dx.doi.org/10.4018/ijdcf.2020010108.
Full textZhang, Shanqing, Hui Li, Li Li, Jianfeng Lu, and Ziqian Zuo. "A High-Capacity Steganography Algorithm Based on Adaptive Frequency Channel Attention Networks." Sensors 22, no. 20 (October 15, 2022): 7844. http://dx.doi.org/10.3390/s22207844.
Full textChi, Heng-Xiao, Ji-Hwei Horng, Chin-Chen Chang, and Yung-Hui Li. "Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy." Sensors 22, no. 20 (October 18, 2022): 7942. http://dx.doi.org/10.3390/s22207942.
Full textM, Abhinaya, and A. Umamakeswari. "A Robust Image Watermarking Method based on Contourlet Transform for Correcting Geometric Attacks." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 24. http://dx.doi.org/10.14419/ijet.v7i2.24.11992.
Full textBogacki, Piotr, and Andrzej Dziech. "Analysis of New Orthogonal Transforms for Digital Watermarking." Sensors 22, no. 7 (March 29, 2022): 2628. http://dx.doi.org/10.3390/s22072628.
Full textLee, Yeuan-Kuen, and Ling-Hwei Chen. "Secure Error-Free Steganography for JPEG Images." International Journal of Pattern Recognition and Artificial Intelligence 17, no. 06 (September 2003): 967–81. http://dx.doi.org/10.1142/s021800140300268x.
Full textChang, Ching-Chun. "Neural Reversible Steganography with Long Short-Term Memory." Security and Communication Networks 2021 (April 4, 2021): 1–14. http://dx.doi.org/10.1155/2021/5580272.
Full textProgonov, Dmytro. "Multi-Datasets Evaluation of GB-RAS Network Based Stegdetectors Robustness to Domain Adaptation Problem." Information Theories and Applications 28, no. 4 (2021): 372–96. http://dx.doi.org/10.54521/ijita28-04-p04.
Full textWANG, Junxiang, Jiangqun NI, Dong ZHANG, and Hao LUO. "Improved Histogram Shifting Technique for Low Payload Embedding by Using a Rate-Distortion Model and Optimal Side Information Selection." IEICE Transactions on Information and Systems E95.D, no. 10 (2012): 2552–55. http://dx.doi.org/10.1587/transinf.e95.d.2552.
Full textMa, Bin, Bing Li, Xiao-Yu Wang, Chun-Peng Wang, Jian Li, and Yun-Qing Shi. "Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image." Security and Communication Networks 2019 (January 17, 2019): 1–9. http://dx.doi.org/10.1155/2019/4732632.
Full textLee, Jenny Hyunjung, Darius Coelho, and Klaus Mueller. "Cluster Appearance Glyphs: A Methodology for Illustrating High-Dimensional Data Patterns in 2-D Data Layouts." Information 13, no. 1 (December 23, 2021): 3. http://dx.doi.org/10.3390/info13010003.
Full textLian, Lu, and Tong Lei. "Film and Television Animation Sensing and Visual Image by Computer Digital Image Technology." Journal of Mathematics 2022 (January 29, 2022): 1–8. http://dx.doi.org/10.1155/2022/6331233.
Full textHemis, Mustapha, Bachir Boudraa, and Thouraya Merazi-Meksen. "New secure and robust audio watermarking algorithm based on QR factorization in wavelet domain." International Journal of Wavelets, Multiresolution and Information Processing 13, no. 03 (May 2015): 1550020. http://dx.doi.org/10.1142/s0219691315500204.
Full textFang Ren, Fang Ren, Yi-Ping Yang Fang Ren, and Zhe-Lin Zhang Yi-Ping Yang. "Dynamic Hybrid Reversible Data Hiding Based on Pixel-value-ordering." 電腦學刊 34, no. 6 (December 2023): 015–29. http://dx.doi.org/10.53106/199115992023123406002.
Full textAltimime, Sajad, and Zainab Hussain. "Watermarking Using Energy-LSB Embedded Method." Wasit Journal of Computer and Mathematics Science 1, no. 3 (October 1, 2022): 140–48. http://dx.doi.org/10.31185/wjcm.53.
Full textDenisiuk, Aleksander, and Michał Grabowski. "Low Distortion Embedding of the Hamming Space into a Sphere with Quadrance Metric and k-means Clustering of Nominal-continuous Data." Fundamenta Informaticae 153, no. 3 (June 16, 2017): 221–33. http://dx.doi.org/10.3233/fi-2017-1538.
Full textAlex Rajju Balan, J. A., and S. Edward Rajan. "A novel embedding technique for lossless data hiding in medical images employing histogram shifting method." International Journal of Wavelets, Multiresolution and Information Processing 12, no. 03 (May 2014): 1450026. http://dx.doi.org/10.1142/s021969131450026x.
Full textMa, Rongkai, Pengfei Fang, Tom Drummond, and Mehrtash Harandi. "Adaptive Poincaré Point to Set Distance for Few-Shot Classification." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 2 (June 28, 2022): 1926–34. http://dx.doi.org/10.1609/aaai.v36i2.20087.
Full textKim, Cheonshik, Nhu-Ngoc Dao, Ki-Hyun Jung, and Lu Leng. "Dual Reversible Data Hiding in Encrypted Halftone Images Using Matrix Encoding." Electronics 12, no. 14 (July 19, 2023): 3134. http://dx.doi.org/10.3390/electronics12143134.
Full textAlhaddad, Mohammed J., Monagi H. Alkinani, Mohammed Salem Atoum, and Alaa Abdulsalm Alarood. "Evolutionary Detection Accuracy of Secret Data in Audio Steganography for Securing 5G-Enabled Internet of Things." Symmetry 12, no. 12 (December 14, 2020): 2071. http://dx.doi.org/10.3390/sym12122071.
Full text