Artículos de revistas sobre el tema "Low-distortion embedding"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Low-distortion embedding".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Castermans, Thom, Kevin Verbeek, Bettina Speckmann, Michel A. Westenberg, Rob Koopman, Shenghui Wang, Hein van den Berg y Arianna Betti. "SolarView: Low Distortion Radial Embedding with a Focus". IEEE Transactions on Visualization and Computer Graphics 25, n.º 10 (1 de octubre de 2019): 2969–82. http://dx.doi.org/10.1109/tvcg.2018.2865361.
Texto completoShih, Frank Y. y Xin Zhong. "Intelligent Watermarking for High-Capacity Low-Distortion Data Embedding". International Journal of Pattern Recognition and Artificial Intelligence 30, n.º 05 (21 de abril de 2016): 1654003. http://dx.doi.org/10.1142/s0218001416540033.
Texto completoLi, Wan Qi, Heng Wang, Che Nian, Huang Wei y Hong Yao You. "Minimizing the Embedding Impact Using Network Flow Algorithms". Advanced Materials Research 341-342 (septiembre de 2011): 478–83. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.478.
Texto completoNguyen, Dinh-Chien, Thai-Son Nguyen, Chin-Chen Chang, Huan-Sheng Hsueh y Fang-Rong Hsu. "High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift". Security and Communication Networks 2018 (1 de agosto de 2018): 1–11. http://dx.doi.org/10.1155/2018/2029869.
Texto completoHu, Yongjin, Xiyan Li y Jun Ma. "A Novel LSB Matching Algorithm Based on Information Pre-Processing". Mathematics 10, n.º 1 (21 de diciembre de 2021): 8. http://dx.doi.org/10.3390/math10010008.
Texto completoWang, Ruosong y David P. Woodruff. "Tight Bounds for ℓ 1 Oblivious Subspace Embeddings". ACM Transactions on Algorithms 18, n.º 1 (31 de enero de 2022): 1–32. http://dx.doi.org/10.1145/3477537.
Texto completoZhang, Shun, Liang Yang, Xihao Xu y Tiegang Gao. "Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System". International Journal of Digital Crime and Forensics 10, n.º 1 (enero de 2018): 40–53. http://dx.doi.org/10.4018/ijdcf.2018010104.
Texto completoYang, Yuhang, Xuyu Xiang, Jiaohua Qin, Yun Tan, Zhangdong Wang y Yajie Liu. "High-Embedded Low-Distortion Multihistogram Shift Video Reversible Data Hiding Based on DCT Coefficient". Electronics 12, n.º 7 (31 de marzo de 2023): 1652. http://dx.doi.org/10.3390/electronics12071652.
Texto completoTsai, Yuan-Yu, Yao-Hsien Huang, Ruo-Jhu Lin y Chi-Shiang Chan. "An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting". International Journal of Digital Crime and Forensics 8, n.º 2 (abril de 2016): 48–61. http://dx.doi.org/10.4018/ijdcf.2016040105.
Texto completoWu, Nan-I., Kuo-Chen Wu y Chung-Ming Wang. "Exploring pixel-value differencing and base decomposition for low distortion data embedding". Applied Soft Computing 12, n.º 2 (febrero de 2012): 942–60. http://dx.doi.org/10.1016/j.asoc.2011.09.002.
Texto completoChari, Tara y Lior Pachter. "The specious art of single-cell genomics". PLOS Computational Biology 19, n.º 8 (17 de agosto de 2023): e1011288. http://dx.doi.org/10.1371/journal.pcbi.1011288.
Texto completoYin, Te Lung y Xu Ren Luo. "Reversible Data Hiding Exploiting Coefficients Histogram in Wavelet Transform Domain". Applied Mechanics and Materials 284-287 (enero de 2013): 3164–67. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3164.
Texto completoPan, Yi-Lun y Ja-Ling Wu. "Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images". Entropy 24, n.º 7 (15 de julio de 2022): 982. http://dx.doi.org/10.3390/e24070982.
Texto completoTsai, Yuan-Yu, Yu-Shiou Tsai y Chia-Chun Chang. "An Effective Authentication Algorithm for Polygonal Models with High Embedding Capacity". Symmetry 10, n.º 7 (18 de julio de 2018): 290. http://dx.doi.org/10.3390/sym10070290.
Texto completoMa, Bin, Xiao-Yu Wang y Bing Li. "A New Kind of High Capacity and Security Reversible Data Hiding Scheme". International Journal of Digital Crime and Forensics 11, n.º 4 (octubre de 2019): 118–29. http://dx.doi.org/10.4018/ijdcf.2019100108.
Texto completoChen, HaiShan, Jinye Wang, Yiqing Zhou, TingCheng Chang, KunQuan Shi y JunYing Yuan. "Improving the Security of Reversible Data Hiding Using Multiple Histogram Modification". Mathematical Problems in Engineering 2022 (18 de enero de 2022): 1–12. http://dx.doi.org/10.1155/2022/7192697.
Texto completoJuarez-Sandoval, Oswaldo Ulises, Laura Josefina Reyes-Ruiz, Francisco Garcia-Ugalde, Manuel Cedillo-Hernandez, Jazmin Ramirez-Hernandez y Robert Morelos-Zaragoza. "Additional Information Delivery to Image Content via Improved Unseen–Visible Watermarking". Electronics 10, n.º 18 (7 de septiembre de 2021): 2186. http://dx.doi.org/10.3390/electronics10182186.
Texto completoJin, Liu y Yiwen Zhang. "An Improved NID Steganography Method for Low Bitrate Speech on VoIP". Modern Electronic Technology 5, n.º 1 (6 de mayo de 2021): 1. http://dx.doi.org/10.26549/met.v5i1.6167.
Texto completoTsai, Yuan-Yu, Tsung-Chieh Cheng y Yao-Hsien Huang. "A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models". Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/1096463.
Texto completoKim, Cheonshik, Dong-Kyoo Shin, Ching-Nung Yang y Lu Leng. "Hybrid Data Hiding Based on AMBTC Using Enhanced Hamming Code". Applied Sciences 10, n.º 15 (2 de agosto de 2020): 5336. http://dx.doi.org/10.3390/app10155336.
Texto completoLi, Jian Yong, Yan Qiu Yang, Qi Liang Tang y Tong Wang. "A Watermarking of Two Dimensions Based on DCT". Applied Mechanics and Materials 263-266 (diciembre de 2012): 2901–5. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2901.
Texto completoWang, Jen-Tse, Yi-Ching Chang, Chun-Yuan Yu y Shyr-Shen Yu. "Hamming Code Based Watermarking Scheme for 3D Model Verification". Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/241093.
Texto completoLeng, Hui-Shih. "Generalized Scheme Based on Octagon-Shaped Shell for Data Hiding in Steganographic Applications". Symmetry 11, n.º 6 (4 de junio de 2019): 760. http://dx.doi.org/10.3390/sym11060760.
Texto completoPang, LieLin, KokSheik Wong, Yiqi Tew y Susanto Rahardja. "Data Embedding in SHVC Video Using Threshold-Controlled Block Splitting". Applied Sciences 11, n.º 11 (25 de mayo de 2021): 4850. http://dx.doi.org/10.3390/app11114850.
Texto completoZhao, Shuai, Jifeng Sun, Hongshi Ou y Yibin Lin. "A Novel Multi-Task Face Super-Resolution Framework Embedding Degraded Augmented GAN Networks". Journal of Physics: Conference Series 2303, n.º 1 (1 de julio de 2022): 012061. http://dx.doi.org/10.1088/1742-6596/2303/1/012061.
Texto completoChen, Weitong, Na Ren, Changqing Zhu, Qifei Zhou, Tapio Seppänen y Anja Keskinarkaus. "Screen-Cam Robust Image Watermarking with Feature-Based Synchronization". Applied Sciences 10, n.º 21 (25 de octubre de 2020): 7494. http://dx.doi.org/10.3390/app10217494.
Texto completoYongjun, Kong, Zhang Minqing, Wang Zexi, Ke Yan y Huang Siyuan. "Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process". Security and Communication Networks 2022 (12 de mayo de 2022): 1–17. http://dx.doi.org/10.1155/2022/6299469.
Texto completoMaity, Hirak Kumar y Santi P. Maity. "FPGA Implementation for Modified RCM-RW on Digital Images". Journal of Circuits, Systems and Computers 26, n.º 03 (21 de noviembre de 2016): 1750044. http://dx.doi.org/10.1142/s021812661750044x.
Texto completoChen, Tzung-Her y Jing-Ya Yan. "Enhanced Steganography for High Dynamic Range Images with Improved Security and Capacity". Applied Sciences 13, n.º 15 (1 de agosto de 2023): 8865. http://dx.doi.org/10.3390/app13158865.
Texto completoTan, Xiu Hu. "A Blind Watermarking Method Based on Space Reconstruction". Applied Mechanics and Materials 444-445 (octubre de 2013): 712–16. http://dx.doi.org/10.4028/www.scientific.net/amm.444-445.712.
Texto completoHuang, Dan y Fangjun Huang. "Reversible Data Hiding Based on Adaptive Block Selection Strategy". International Journal of Digital Crime and Forensics 12, n.º 1 (enero de 2020): 157–68. http://dx.doi.org/10.4018/ijdcf.2020010108.
Texto completoZhang, Shanqing, Hui Li, Li Li, Jianfeng Lu y Ziqian Zuo. "A High-Capacity Steganography Algorithm Based on Adaptive Frequency Channel Attention Networks". Sensors 22, n.º 20 (15 de octubre de 2022): 7844. http://dx.doi.org/10.3390/s22207844.
Texto completoChi, Heng-Xiao, Ji-Hwei Horng, Chin-Chen Chang y Yung-Hui Li. "Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy". Sensors 22, n.º 20 (18 de octubre de 2022): 7942. http://dx.doi.org/10.3390/s22207942.
Texto completoM, Abhinaya y A. Umamakeswari. "A Robust Image Watermarking Method based on Contourlet Transform for Correcting Geometric Attacks". International Journal of Engineering & Technology 7, n.º 2.24 (25 de abril de 2018): 24. http://dx.doi.org/10.14419/ijet.v7i2.24.11992.
Texto completoBogacki, Piotr y Andrzej Dziech. "Analysis of New Orthogonal Transforms for Digital Watermarking". Sensors 22, n.º 7 (29 de marzo de 2022): 2628. http://dx.doi.org/10.3390/s22072628.
Texto completoLee, Yeuan-Kuen y Ling-Hwei Chen. "Secure Error-Free Steganography for JPEG Images". International Journal of Pattern Recognition and Artificial Intelligence 17, n.º 06 (septiembre de 2003): 967–81. http://dx.doi.org/10.1142/s021800140300268x.
Texto completoChang, Ching-Chun. "Neural Reversible Steganography with Long Short-Term Memory". Security and Communication Networks 2021 (4 de abril de 2021): 1–14. http://dx.doi.org/10.1155/2021/5580272.
Texto completoProgonov, Dmytro. "Multi-Datasets Evaluation of GB-RAS Network Based Stegdetectors Robustness to Domain Adaptation Problem". Information Theories and Applications 28, n.º 4 (2021): 372–96. http://dx.doi.org/10.54521/ijita28-04-p04.
Texto completoWANG, Junxiang, Jiangqun NI, Dong ZHANG y Hao LUO. "Improved Histogram Shifting Technique for Low Payload Embedding by Using a Rate-Distortion Model and Optimal Side Information Selection". IEICE Transactions on Information and Systems E95.D, n.º 10 (2012): 2552–55. http://dx.doi.org/10.1587/transinf.e95.d.2552.
Texto completoMa, Bin, Bing Li, Xiao-Yu Wang, Chun-Peng Wang, Jian Li y Yun-Qing Shi. "Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image". Security and Communication Networks 2019 (17 de enero de 2019): 1–9. http://dx.doi.org/10.1155/2019/4732632.
Texto completoLee, Jenny Hyunjung, Darius Coelho y Klaus Mueller. "Cluster Appearance Glyphs: A Methodology for Illustrating High-Dimensional Data Patterns in 2-D Data Layouts". Information 13, n.º 1 (23 de diciembre de 2021): 3. http://dx.doi.org/10.3390/info13010003.
Texto completoLian, Lu y Tong Lei. "Film and Television Animation Sensing and Visual Image by Computer Digital Image Technology". Journal of Mathematics 2022 (29 de enero de 2022): 1–8. http://dx.doi.org/10.1155/2022/6331233.
Texto completoHemis, Mustapha, Bachir Boudraa y Thouraya Merazi-Meksen. "New secure and robust audio watermarking algorithm based on QR factorization in wavelet domain". International Journal of Wavelets, Multiresolution and Information Processing 13, n.º 03 (mayo de 2015): 1550020. http://dx.doi.org/10.1142/s0219691315500204.
Texto completoFang Ren, Fang Ren, Yi-Ping Yang Fang Ren y Zhe-Lin Zhang Yi-Ping Yang. "Dynamic Hybrid Reversible Data Hiding Based on Pixel-value-ordering". 電腦學刊 34, n.º 6 (diciembre de 2023): 015–29. http://dx.doi.org/10.53106/199115992023123406002.
Texto completoAltimime, Sajad y Zainab Hussain. "Watermarking Using Energy-LSB Embedded Method". Wasit Journal of Computer and Mathematics Science 1, n.º 3 (1 de octubre de 2022): 140–48. http://dx.doi.org/10.31185/wjcm.53.
Texto completoDenisiuk, Aleksander y Michał Grabowski. "Low Distortion Embedding of the Hamming Space into a Sphere with Quadrance Metric and k-means Clustering of Nominal-continuous Data". Fundamenta Informaticae 153, n.º 3 (16 de junio de 2017): 221–33. http://dx.doi.org/10.3233/fi-2017-1538.
Texto completoAlex Rajju Balan, J. A. y S. Edward Rajan. "A novel embedding technique for lossless data hiding in medical images employing histogram shifting method". International Journal of Wavelets, Multiresolution and Information Processing 12, n.º 03 (mayo de 2014): 1450026. http://dx.doi.org/10.1142/s021969131450026x.
Texto completoMa, Rongkai, Pengfei Fang, Tom Drummond y Mehrtash Harandi. "Adaptive Poincaré Point to Set Distance for Few-Shot Classification". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 2 (28 de junio de 2022): 1926–34. http://dx.doi.org/10.1609/aaai.v36i2.20087.
Texto completoKim, Cheonshik, Nhu-Ngoc Dao, Ki-Hyun Jung y Lu Leng. "Dual Reversible Data Hiding in Encrypted Halftone Images Using Matrix Encoding". Electronics 12, n.º 14 (19 de julio de 2023): 3134. http://dx.doi.org/10.3390/electronics12143134.
Texto completoAlhaddad, Mohammed J., Monagi H. Alkinani, Mohammed Salem Atoum y Alaa Abdulsalm Alarood. "Evolutionary Detection Accuracy of Secret Data in Audio Steganography for Securing 5G-Enabled Internet of Things". Symmetry 12, n.º 12 (14 de diciembre de 2020): 2071. http://dx.doi.org/10.3390/sym12122071.
Texto completo