Littérature scientifique sur le sujet « Low-distortion embedding »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Low-distortion embedding ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Low-distortion embedding"

1

Castermans, Thom, Kevin Verbeek, Bettina Speckmann, et al. "SolarView: Low Distortion Radial Embedding with a Focus." IEEE Transactions on Visualization and Computer Graphics 25, no. 10 (2019): 2969–82. http://dx.doi.org/10.1109/tvcg.2018.2865361.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Shih, Frank Y., and Xin Zhong. "Intelligent Watermarking for High-Capacity Low-Distortion Data Embedding." International Journal of Pattern Recognition and Artificial Intelligence 30, no. 05 (2016): 1654003. http://dx.doi.org/10.1142/s0218001416540033.

Texte intégral
Résumé :
Image watermarking intends to hide secret data for the purposes of copyright protection, image authentication, data privacy, and broadcast monitoring. The ultimate goal is to achieve highest embedding capacity and lowest image distortion. In this paper, we present an intelligent watermarking scheme which can automatically analyze an image content to extract significant regions of interest (ROIs). A ROI is an area involving crucial information, and will be kept intact. The remaining regions of non-interest (RONIs) are collated for embedding watermarks, and will be ranked according to their entr
Styles APA, Harvard, Vancouver, ISO, etc.
3

Li, Wan Qi, Heng Wang, Che Nian, Huang Wei, and Hong Yao You. "Minimizing the Embedding Impact Using Network Flow Algorithms." Advanced Materials Research 341-342 (September 2011): 478–83. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.478.

Texte intégral
Résumé :
A novel method of minimizing the embedding impact is proposed in this paper. Optimal embedding is achieved using network flow algorithms by considering the modifications on the cover image as flows of pixels among different states. This method is not an independent steganographic scheme, but rather it minimizes the embedding impact after the embedding process and it’s compatible with the majority of embedding techniques. Due to its dependence on the embedding process, many optimization problems, such as the minimization of a globally interactive distortion function, that are intractable during
Styles APA, Harvard, Vancouver, ISO, etc.
4

Nguyen, Dinh-Chien, Thai-Son Nguyen, Chin-Chen Chang, Huan-Sheng Hsueh, and Fang-Rong Hsu. "High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift." Security and Communication Networks 2018 (August 1, 2018): 1–11. http://dx.doi.org/10.1155/2018/2029869.

Texte intégral
Résumé :
Data hiding is a technique that allows secret data to be delivered securely by embedding the data into cover digital media. In this paper, we propose a new data hiding algorithm for H.264/advanced video coding (AVC) of video sequences with high embedding capacity. In the proposed scheme, to embed secret data into the quantized discrete cosine transform (QDCT) coefficients of I frames without any intraframe distortion drift, some embeddable coefficient pairs are selected in each block, and they are divided into two different groups, i.e., the embedding group and the averting group. The embeddin
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hu, Yongjin, Xiyan Li, and Jun Ma. "A Novel LSB Matching Algorithm Based on Information Pre-Processing." Mathematics 10, no. 1 (2021): 8. http://dx.doi.org/10.3390/math10010008.

Texte intégral
Résumé :
This paper analyzes random bits and scanned documents, two forms of secret data. The secret data were pre-processed by halftone, quadtree, and S-Box transformations, and the size of the scanned document was reduced by 8.11 times. A novel LSB matching algorithm with low distortion was proposed for the embedding step. The golden ratio was firstly applied to find the optimal embedding position and was used to design the matching function. Both theory and experiment have demonstrated that our study presented a good trade-off between high capacity and low distortion and is superior to other related
Styles APA, Harvard, Vancouver, ISO, etc.
6

Wang, Ruosong, та David P. Woodruff. "Tight Bounds for ℓ 1 Oblivious Subspace Embeddings". ACM Transactions on Algorithms 18, № 1 (2022): 1–32. http://dx.doi.org/10.1145/3477537.

Texte intégral
Résumé :
An \ell _p oblivious subspace embedding is a distribution over r \times n matrices \Pi such that for any fixed n \times d matrix A , \[ \Pr _{\Pi }[\textrm {for all }x, \ \Vert Ax\Vert _p \le \Vert \Pi Ax\Vert _p \le \kappa \Vert Ax\Vert _p] \ge 9/10, \] where r is the dimension of the embedding, \kappa is the distortion of the embedding, and for an n -dimensional vector y , \Vert y\Vert _p = (\sum _{i=1}^n |y_i|^p)^{1/p} is the \ell _p -norm. Another important property is the sparsity of \Pi , that is, the maximum number of non-zero entries per column, as this determines the running time of c
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zhang, Shun, Liang Yang, Xihao Xu, and Tiegang Gao. "Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System." International Journal of Digital Crime and Forensics 10, no. 1 (2018): 40–53. http://dx.doi.org/10.4018/ijdcf.2018010104.

Texte intégral
Résumé :
Security always plays an important role in the communication. Steganography, which conceals the process of communication, is another efficient way to achieve secure communication besides encryption. This paper proposes a secure steganography scheme in JPEG images with high embedding capacity and low distortion to the cover image. It embeds the additional information by modifying the DCT coefficients in JPEG images. Considering the size of the additional information, some DCT coefficients are adaptively selected in the embedding process. Two chaotic encryption strategies are designed based on t
Styles APA, Harvard, Vancouver, ISO, etc.
8

Yang, Yuhang, Xuyu Xiang, Jiaohua Qin, Yun Tan, Zhangdong Wang, and Yajie Liu. "High-Embedded Low-Distortion Multihistogram Shift Video Reversible Data Hiding Based on DCT Coefficient." Electronics 12, no. 7 (2023): 1652. http://dx.doi.org/10.3390/electronics12071652.

Texte intégral
Résumé :
Video reversible data hiding technology can be applied to copyright protection, medical images, the military, and other fields, but it cannot guarantee high visual quality with an effective embedded capacity. In this paper, a high-embedding and low-distortion reversible data hiding scheme based on a discrete cosine transform (DCT) coefficients method is proposed. The scheme first decodes the original video stream with entropy, obtains all the DCT blocks, and selects the embeddable DCT blocks according to the capacity of the zero factor. Then, it divides the coefficients in the DCT blocks into
Styles APA, Harvard, Vancouver, ISO, etc.
9

Tsai, Yuan-Yu, Yao-Hsien Huang, Ruo-Jhu Lin, and Chi-Shiang Chan. "An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting." International Journal of Digital Crime and Forensics 8, no. 2 (2016): 48–61. http://dx.doi.org/10.4018/ijdcf.2016040105.

Texte intégral
Résumé :
Data hiding can be regarded as a type of image processing techniques. Other image processing operations are usually integrated to increase the embedding capacity or decrease the visual distortion. Interpolation is an example of this type of operation. However, previous interpolation-based data hiding algorithms suffered from low and fixed embedding capacity and high visual distortion. This study proposes a more effective two-stage data hiding algorithm based on interpolation, LSB substitution, and histogram shifting. First, the authors modify the formula for embedding capacity calculation and
Styles APA, Harvard, Vancouver, ISO, etc.
10

Wu, Nan-I., Kuo-Chen Wu, and Chung-Ming Wang. "Exploring pixel-value differencing and base decomposition for low distortion data embedding." Applied Soft Computing 12, no. 2 (2012): 942–60. http://dx.doi.org/10.1016/j.asoc.2011.09.002.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Low-distortion embedding"

1

Carpenter, Timothy E. "Algorithms For Low-Distortion Embeddings Into Geometrically Restricted Spaces." The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1555337435997622.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Sidiropoulos, Anastasios. "Approximation algorithms for low-distortion embeddings into low-dimensional spaces." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34126.

Texte intégral
Résumé :
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.<br>Includes bibliographical references (p. 33-35).<br>We present several approximation algorithms for the problem of embedding metric spaces into a line, and into the two-dimensional plane. We give an O([square root] n)-approximation algorithm for the problem of finding a line embedding of a metric induced by a given unweighted graph, that minimizes the (standard) multiplicative distortion. For the same problem, we give an exact algorithm, with running-time exponential in the disto
Styles APA, Harvard, Vancouver, ISO, etc.
3

Yan, Yiqing. "Scalable and accurate algorithms for computational genomics and dna-based digital storage." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS078.

Texte intégral
Résumé :
La réduction des coûts et l'amélioration du débit de la technologie de séquençage ont entraîné de nouvelles avancées dans des applications telles que la médecine de précision et le stockage basé sur l'ADN. Cependant, le résultat séquencé contient des erreurs. Pour mesurer la similitude entre le résultat séquencé et la référence, la distance d'édition est préférée en pratique à la distance de Hamming en raison des indels. Le calcul de la distance d'édition est complexe quadratique. Par conséquent, l'analyse de similarité de séquence nécessite beaucoup de calculs. Dans cette thèse, nous introdui
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ke, Yen-Ching, and 柯衍慶. "A Study of Low Distortion or Distortion-free Data Embedding Algorithms for High Dynamic Range Images." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/11542322514894594244.

Texte intégral
Résumé :
碩士<br>國立中興大學<br>資訊網路多媒體研究所<br>100<br>In this paper, we investigate data embedding algorithms for high dynamic range images encoded by the RGBE image format. We present four algorithms that have the distortion-free feature and one algorithm that demonstrates the feature of very low distortion. Our first algorithm belongs to the distortion-free manner. In this algorithm, we make use of all statuses produced by the pixel variation and employ triplet coding technology to increase the embedding capacity. Comparing with the previous work, our algorithm can improve the embedding capacity in the range
Styles APA, Harvard, Vancouver, ISO, etc.
5

JHANG, YONG, and 張顒. "A Study of Data Hiding Algorithm with High Embedding Capacity and Low Distortion." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/08892940439139247182.

Texte intégral
Résumé :
碩士<br>稻江科技暨管理學院<br>數位內容設計與管理學系研究所<br>102<br>In this thesis, a novel data hiding method, designed base on human visual perception and capable of offering high invisibility, is proposed to enable the user to conceal large amounts of secret data into edge areas of still images. In order to achieve a higher payload and to obtain a better stego image quality, the principle of payload allotment is to hide more data into edge areas than smooth areas, thus serving the ultimate purpose of maintaining human imperceptibility to the distortion in the image caused by the embedding of the secret message. In
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Low-distortion embedding"

1

Faragó, András. "Low Distortion Metric Embedding into Constant Dimension." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20877-5_12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Sarkar, Rik. "Low Distortion Delaunay Embedding of Trees in Hyperbolic Plane." In Graph Drawing. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25878-7_34.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Babilon, Robert, Jiří Matoušek, Jana Maxová, and Pavel Valtr. "Low-Distortion Embeddings of Trees." In Graph Drawing. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45848-4_27.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Bhattacharya, Arnab, Purushottam Kar, and Manjish Pal. "On Low Distortion Embeddings of Statistical Distance Measures into Low Dimensional Spaces." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03573-9_13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Wu, Hanzhou. "Graph Models in Information Hiding." In Graph Theory [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.98592.

Texte intégral
Résumé :
Information hiding allows us to hide secret information into digital objects such as images without significantly distorting the objects. The object containing hidden information will be transmitted to a data receiver via a probably insecure channel. To securely transmit the object carrying hidden information, the distortion caused by data embedding should be as low as possible, which is referred to as the rate-distortion optimization problem. Many conventional methods optimize the data embedding procedure by a heuristic fashion, which may be not optimal in terms of the rate-distortion performance. In this chapter, we introduce novel approaches that use graph theory for information hiding. These graph models are general and can be used for improving the rate-distortion performance of information hiding systems. In addition to rate-distortion optimization, recent graph models used for system design of information hiding will be also reviewed. This chapter is intended as a tutorial introducing advanced graph models applied to information hiding.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Babilon, Robert, Jiří Matoušek, Jana Maxová, and Pavel Valtr. "Low-Distortion Embeddings of Trees." In Graph Algorithms and Applications 4. WORLD SCIENTIFIC, 2006. http://dx.doi.org/10.1142/9789812773296_0018.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Diwaker, Ritesh, and Deepak Asrani. "Multimedia Security in Audio Signal." In Artificial intelligence and Multimedia Data Engineering. BENTHAM SCIENCE PUBLISHERS, 2023. http://dx.doi.org/10.2174/9789815196443123010008.

Texte intégral
Résumé :
The security of Digital media has been varying continuously due to advanced malware attacks. Multimedia security has become one of the major concerns since new technologies are introduced. The proposed paper applied the watermarking technique in digital audio signals in which unique data is inserted in one-dimensional data in such a way that it must not affect the major information of the audio signal. The hybrid decomposition scheme has been applied to the audio data in order to extract features in terms of energy bands. The data is kept hidden in a low significant energy band that contains less information. This watermarking technique ensures the ownership of the multimedia data. Only authorized authors can be able to claim ownership of the audio data. The correct authorization of audio data can be proven by the extraction method in which the hidden watermark data has been extracted back to its original form without leaving any distortion in audio data. The proposed work introduces a hybrid approach to watermarking 2D data into an audio file. A hybrid audio decomposition technique was introduced by the proposed scheme in which a dual form of audio decomposition method has been applied containing Fast Fourier transform (FFT) and Cordic QR scheme. The correct location from the energy band has been found to embed the watermark data. Before the embedding procedure, the watermarking data has been selected. The proposed method selects an image containing information as a watermark that is first encrypted before initiating the embedding process. Watermark Encryption has been done using a cyclic coding algorithm and Arnold’s cat map. The disintegration of the audio file will finally result in Q and R matrices. Both such matrices are of orthogonal type. Then, the encrypted watermark data has been implanted in a random fashion in the R component of decomposed audio data during the embedding process. The inverse procedure has been applied for the watermark extraction and decryption process.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Indyk, Piotr, and Ji_í Matou_ek. "Low-Distortion Embeddings of Finite Metric Spaces." In Handbook of Discrete and Computational Geometry, Second Edition. Chapman and Hall/CRC, 2004. http://dx.doi.org/10.1201/9781420035315.ch8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

"Low-Distortion Embeddings of Finite Metric Spaces." In Handbook of Discrete and Computational Geometry, Second Edition. Chapman and Hall/CRC, 2004. http://dx.doi.org/10.1201/9781420035315-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Low-distortion embedding"

1

Koranne, S. "Analysis of very large resistive networks using low distortion embedding." In 2013 14th International Symposium on Quality Electronic Design (ISQED 2013). IEEE, 2013. http://dx.doi.org/10.1109/isqed.2013.6523659.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Ostrovsky, Rafail, and Yuval Rabani. "Low distortion embeddings for edit distance." In the thirty-seventh annual ACM symposium. ACM Press, 2005. http://dx.doi.org/10.1145/1060590.1060623.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Braunsmann, Juliane, Marko Rajkovic, Martin Rumpf, and Benedikt Wirth. "Learning low bending and low distortion manifold embeddings." In 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 2021. http://dx.doi.org/10.1109/cvprw53098.2021.00498.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Indyk, P. "Algorithmic applications of low-distortion geometric embeddings." In Proceedings 42nd IEEE Symposium on Foundations of Computer Science. IEEE, 2001. http://dx.doi.org/10.1109/sfcs.2001.959878.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Rousselot, S., D. Truffi, G. Doulgeris, S. Mistry, V. Pachidis, and P. Pilidis. "Generation of a Quasi 3-D Map of a Half-Embedded Ultra High Bypass Ratio Turbofan Intake on the Wing of a Broad Delta Wing Airframe." In ASME Turbo Expo 2008: Power for Land, Sea, and Air. ASMEDC, 2008. http://dx.doi.org/10.1115/gt2008-51008.

Texte intégral
Résumé :
The need for low fuel consumption, emissions and noise drives future propulsion systems towards ultra high bypass ratio turbofan configurations. One of the arising challenges is the installation of such an engine, due to its high diameter. An alternative to under-the-wing podded installation is half embedding it into a thick wing. An ideal airframe has been found to be the Broad Delta (BD) wing, featuring high wing-root thickness. Two conventional nacelles have been integrated into each wing of a four-engine BD body. The performance of a half embedded turbofan intake has been studied, with the
Styles APA, Harvard, Vancouver, ISO, etc.
6

Bǎdoiu, Mihai, Julia Chuzhoy, Piotr Indyk, and Anastasios Sidiropoulos. "Low-distortion embeddings of general metrics into the line." In the thirty-seventh annual ACM symposium. ACM Press, 2005. http://dx.doi.org/10.1145/1060590.1060624.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Fawzi, Omar, Patrick Hayden, and Pranab Sen. "From low-distortion norm embeddings to explicit uncertainty relations and efficient information locking." In the 43rd annual ACM symposium. ACM Press, 2011. http://dx.doi.org/10.1145/1993636.1993738.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Meng, Xiangrui, and Michael W. Mahoney. "Low-distortion subspace embeddings in input-sparsity time and applications to robust linear regression." In the 45th annual ACM symposium. ACM Press, 2013. http://dx.doi.org/10.1145/2488608.2488621.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!