Artigos de revistas sobre o tema "Low-distortion embedding"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Low-distortion embedding".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Castermans, Thom, Kevin Verbeek, Bettina Speckmann, Michel A. Westenberg, Rob Koopman, Shenghui Wang, Hein van den Berg e Arianna Betti. "SolarView: Low Distortion Radial Embedding with a Focus". IEEE Transactions on Visualization and Computer Graphics 25, n.º 10 (1 de outubro de 2019): 2969–82. http://dx.doi.org/10.1109/tvcg.2018.2865361.
Texto completo da fonteShih, Frank Y., e Xin Zhong. "Intelligent Watermarking for High-Capacity Low-Distortion Data Embedding". International Journal of Pattern Recognition and Artificial Intelligence 30, n.º 05 (21 de abril de 2016): 1654003. http://dx.doi.org/10.1142/s0218001416540033.
Texto completo da fonteLi, Wan Qi, Heng Wang, Che Nian, Huang Wei e Hong Yao You. "Minimizing the Embedding Impact Using Network Flow Algorithms". Advanced Materials Research 341-342 (setembro de 2011): 478–83. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.478.
Texto completo da fonteNguyen, Dinh-Chien, Thai-Son Nguyen, Chin-Chen Chang, Huan-Sheng Hsueh e Fang-Rong Hsu. "High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift". Security and Communication Networks 2018 (1 de agosto de 2018): 1–11. http://dx.doi.org/10.1155/2018/2029869.
Texto completo da fonteHu, Yongjin, Xiyan Li e Jun Ma. "A Novel LSB Matching Algorithm Based on Information Pre-Processing". Mathematics 10, n.º 1 (21 de dezembro de 2021): 8. http://dx.doi.org/10.3390/math10010008.
Texto completo da fonteWang, Ruosong, e David P. Woodruff. "Tight Bounds for ℓ 1 Oblivious Subspace Embeddings". ACM Transactions on Algorithms 18, n.º 1 (31 de janeiro de 2022): 1–32. http://dx.doi.org/10.1145/3477537.
Texto completo da fonteZhang, Shun, Liang Yang, Xihao Xu e Tiegang Gao. "Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System". International Journal of Digital Crime and Forensics 10, n.º 1 (janeiro de 2018): 40–53. http://dx.doi.org/10.4018/ijdcf.2018010104.
Texto completo da fonteYang, Yuhang, Xuyu Xiang, Jiaohua Qin, Yun Tan, Zhangdong Wang e Yajie Liu. "High-Embedded Low-Distortion Multihistogram Shift Video Reversible Data Hiding Based on DCT Coefficient". Electronics 12, n.º 7 (31 de março de 2023): 1652. http://dx.doi.org/10.3390/electronics12071652.
Texto completo da fonteTsai, Yuan-Yu, Yao-Hsien Huang, Ruo-Jhu Lin e Chi-Shiang Chan. "An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting". International Journal of Digital Crime and Forensics 8, n.º 2 (abril de 2016): 48–61. http://dx.doi.org/10.4018/ijdcf.2016040105.
Texto completo da fonteWu, Nan-I., Kuo-Chen Wu e Chung-Ming Wang. "Exploring pixel-value differencing and base decomposition for low distortion data embedding". Applied Soft Computing 12, n.º 2 (fevereiro de 2012): 942–60. http://dx.doi.org/10.1016/j.asoc.2011.09.002.
Texto completo da fonteChari, Tara, e Lior Pachter. "The specious art of single-cell genomics". PLOS Computational Biology 19, n.º 8 (17 de agosto de 2023): e1011288. http://dx.doi.org/10.1371/journal.pcbi.1011288.
Texto completo da fonteYin, Te Lung, e Xu Ren Luo. "Reversible Data Hiding Exploiting Coefficients Histogram in Wavelet Transform Domain". Applied Mechanics and Materials 284-287 (janeiro de 2013): 3164–67. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3164.
Texto completo da fontePan, Yi-Lun, e Ja-Ling Wu. "Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images". Entropy 24, n.º 7 (15 de julho de 2022): 982. http://dx.doi.org/10.3390/e24070982.
Texto completo da fonteTsai, Yuan-Yu, Yu-Shiou Tsai e Chia-Chun Chang. "An Effective Authentication Algorithm for Polygonal Models with High Embedding Capacity". Symmetry 10, n.º 7 (18 de julho de 2018): 290. http://dx.doi.org/10.3390/sym10070290.
Texto completo da fonteMa, Bin, Xiao-Yu Wang e Bing Li. "A New Kind of High Capacity and Security Reversible Data Hiding Scheme". International Journal of Digital Crime and Forensics 11, n.º 4 (outubro de 2019): 118–29. http://dx.doi.org/10.4018/ijdcf.2019100108.
Texto completo da fonteChen, HaiShan, Jinye Wang, Yiqing Zhou, TingCheng Chang, KunQuan Shi e JunYing Yuan. "Improving the Security of Reversible Data Hiding Using Multiple Histogram Modification". Mathematical Problems in Engineering 2022 (18 de janeiro de 2022): 1–12. http://dx.doi.org/10.1155/2022/7192697.
Texto completo da fonteJuarez-Sandoval, Oswaldo Ulises, Laura Josefina Reyes-Ruiz, Francisco Garcia-Ugalde, Manuel Cedillo-Hernandez, Jazmin Ramirez-Hernandez e Robert Morelos-Zaragoza. "Additional Information Delivery to Image Content via Improved Unseen–Visible Watermarking". Electronics 10, n.º 18 (7 de setembro de 2021): 2186. http://dx.doi.org/10.3390/electronics10182186.
Texto completo da fonteJin, Liu, e Yiwen Zhang. "An Improved NID Steganography Method for Low Bitrate Speech on VoIP". Modern Electronic Technology 5, n.º 1 (6 de maio de 2021): 1. http://dx.doi.org/10.26549/met.v5i1.6167.
Texto completo da fonteTsai, Yuan-Yu, Tsung-Chieh Cheng e Yao-Hsien Huang. "A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models". Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/1096463.
Texto completo da fonteKim, Cheonshik, Dong-Kyoo Shin, Ching-Nung Yang e Lu Leng. "Hybrid Data Hiding Based on AMBTC Using Enhanced Hamming Code". Applied Sciences 10, n.º 15 (2 de agosto de 2020): 5336. http://dx.doi.org/10.3390/app10155336.
Texto completo da fonteLi, Jian Yong, Yan Qiu Yang, Qi Liang Tang e Tong Wang. "A Watermarking of Two Dimensions Based on DCT". Applied Mechanics and Materials 263-266 (dezembro de 2012): 2901–5. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2901.
Texto completo da fonteWang, Jen-Tse, Yi-Ching Chang, Chun-Yuan Yu e Shyr-Shen Yu. "Hamming Code Based Watermarking Scheme for 3D Model Verification". Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/241093.
Texto completo da fonteLeng, Hui-Shih. "Generalized Scheme Based on Octagon-Shaped Shell for Data Hiding in Steganographic Applications". Symmetry 11, n.º 6 (4 de junho de 2019): 760. http://dx.doi.org/10.3390/sym11060760.
Texto completo da fontePang, LieLin, KokSheik Wong, Yiqi Tew e Susanto Rahardja. "Data Embedding in SHVC Video Using Threshold-Controlled Block Splitting". Applied Sciences 11, n.º 11 (25 de maio de 2021): 4850. http://dx.doi.org/10.3390/app11114850.
Texto completo da fonteZhao, Shuai, Jifeng Sun, Hongshi Ou e Yibin Lin. "A Novel Multi-Task Face Super-Resolution Framework Embedding Degraded Augmented GAN Networks". Journal of Physics: Conference Series 2303, n.º 1 (1 de julho de 2022): 012061. http://dx.doi.org/10.1088/1742-6596/2303/1/012061.
Texto completo da fonteChen, Weitong, Na Ren, Changqing Zhu, Qifei Zhou, Tapio Seppänen e Anja Keskinarkaus. "Screen-Cam Robust Image Watermarking with Feature-Based Synchronization". Applied Sciences 10, n.º 21 (25 de outubro de 2020): 7494. http://dx.doi.org/10.3390/app10217494.
Texto completo da fonteYongjun, Kong, Zhang Minqing, Wang Zexi, Ke Yan e Huang Siyuan. "Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process". Security and Communication Networks 2022 (12 de maio de 2022): 1–17. http://dx.doi.org/10.1155/2022/6299469.
Texto completo da fonteMaity, Hirak Kumar, e Santi P. Maity. "FPGA Implementation for Modified RCM-RW on Digital Images". Journal of Circuits, Systems and Computers 26, n.º 03 (21 de novembro de 2016): 1750044. http://dx.doi.org/10.1142/s021812661750044x.
Texto completo da fonteChen, Tzung-Her, e Jing-Ya Yan. "Enhanced Steganography for High Dynamic Range Images with Improved Security and Capacity". Applied Sciences 13, n.º 15 (1 de agosto de 2023): 8865. http://dx.doi.org/10.3390/app13158865.
Texto completo da fonteTan, Xiu Hu. "A Blind Watermarking Method Based on Space Reconstruction". Applied Mechanics and Materials 444-445 (outubro de 2013): 712–16. http://dx.doi.org/10.4028/www.scientific.net/amm.444-445.712.
Texto completo da fonteHuang, Dan, e Fangjun Huang. "Reversible Data Hiding Based on Adaptive Block Selection Strategy". International Journal of Digital Crime and Forensics 12, n.º 1 (janeiro de 2020): 157–68. http://dx.doi.org/10.4018/ijdcf.2020010108.
Texto completo da fonteZhang, Shanqing, Hui Li, Li Li, Jianfeng Lu e Ziqian Zuo. "A High-Capacity Steganography Algorithm Based on Adaptive Frequency Channel Attention Networks". Sensors 22, n.º 20 (15 de outubro de 2022): 7844. http://dx.doi.org/10.3390/s22207844.
Texto completo da fonteChi, Heng-Xiao, Ji-Hwei Horng, Chin-Chen Chang e Yung-Hui Li. "Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy". Sensors 22, n.º 20 (18 de outubro de 2022): 7942. http://dx.doi.org/10.3390/s22207942.
Texto completo da fonteM, Abhinaya, e A. Umamakeswari. "A Robust Image Watermarking Method based on Contourlet Transform for Correcting Geometric Attacks". International Journal of Engineering & Technology 7, n.º 2.24 (25 de abril de 2018): 24. http://dx.doi.org/10.14419/ijet.v7i2.24.11992.
Texto completo da fonteBogacki, Piotr, e Andrzej Dziech. "Analysis of New Orthogonal Transforms for Digital Watermarking". Sensors 22, n.º 7 (29 de março de 2022): 2628. http://dx.doi.org/10.3390/s22072628.
Texto completo da fonteLee, Yeuan-Kuen, e Ling-Hwei Chen. "Secure Error-Free Steganography for JPEG Images". International Journal of Pattern Recognition and Artificial Intelligence 17, n.º 06 (setembro de 2003): 967–81. http://dx.doi.org/10.1142/s021800140300268x.
Texto completo da fonteChang, Ching-Chun. "Neural Reversible Steganography with Long Short-Term Memory". Security and Communication Networks 2021 (4 de abril de 2021): 1–14. http://dx.doi.org/10.1155/2021/5580272.
Texto completo da fonteProgonov, Dmytro. "Multi-Datasets Evaluation of GB-RAS Network Based Stegdetectors Robustness to Domain Adaptation Problem". Information Theories and Applications 28, n.º 4 (2021): 372–96. http://dx.doi.org/10.54521/ijita28-04-p04.
Texto completo da fonteWANG, Junxiang, Jiangqun NI, Dong ZHANG e Hao LUO. "Improved Histogram Shifting Technique for Low Payload Embedding by Using a Rate-Distortion Model and Optimal Side Information Selection". IEICE Transactions on Information and Systems E95.D, n.º 10 (2012): 2552–55. http://dx.doi.org/10.1587/transinf.e95.d.2552.
Texto completo da fonteMa, Bin, Bing Li, Xiao-Yu Wang, Chun-Peng Wang, Jian Li e Yun-Qing Shi. "Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image". Security and Communication Networks 2019 (17 de janeiro de 2019): 1–9. http://dx.doi.org/10.1155/2019/4732632.
Texto completo da fonteLee, Jenny Hyunjung, Darius Coelho e Klaus Mueller. "Cluster Appearance Glyphs: A Methodology for Illustrating High-Dimensional Data Patterns in 2-D Data Layouts". Information 13, n.º 1 (23 de dezembro de 2021): 3. http://dx.doi.org/10.3390/info13010003.
Texto completo da fonteLian, Lu, e Tong Lei. "Film and Television Animation Sensing and Visual Image by Computer Digital Image Technology". Journal of Mathematics 2022 (29 de janeiro de 2022): 1–8. http://dx.doi.org/10.1155/2022/6331233.
Texto completo da fonteHemis, Mustapha, Bachir Boudraa e Thouraya Merazi-Meksen. "New secure and robust audio watermarking algorithm based on QR factorization in wavelet domain". International Journal of Wavelets, Multiresolution and Information Processing 13, n.º 03 (maio de 2015): 1550020. http://dx.doi.org/10.1142/s0219691315500204.
Texto completo da fonteFang Ren, Fang Ren, Yi-Ping Yang Fang Ren e Zhe-Lin Zhang Yi-Ping Yang. "Dynamic Hybrid Reversible Data Hiding Based on Pixel-value-ordering". 電腦學刊 34, n.º 6 (dezembro de 2023): 015–29. http://dx.doi.org/10.53106/199115992023123406002.
Texto completo da fonteAltimime, Sajad, e Zainab Hussain. "Watermarking Using Energy-LSB Embedded Method". Wasit Journal of Computer and Mathematics Science 1, n.º 3 (1 de outubro de 2022): 140–48. http://dx.doi.org/10.31185/wjcm.53.
Texto completo da fonteDenisiuk, Aleksander, e Michał Grabowski. "Low Distortion Embedding of the Hamming Space into a Sphere with Quadrance Metric and k-means Clustering of Nominal-continuous Data". Fundamenta Informaticae 153, n.º 3 (16 de junho de 2017): 221–33. http://dx.doi.org/10.3233/fi-2017-1538.
Texto completo da fonteAlex Rajju Balan, J. A., e S. Edward Rajan. "A novel embedding technique for lossless data hiding in medical images employing histogram shifting method". International Journal of Wavelets, Multiresolution and Information Processing 12, n.º 03 (maio de 2014): 1450026. http://dx.doi.org/10.1142/s021969131450026x.
Texto completo da fonteMa, Rongkai, Pengfei Fang, Tom Drummond e Mehrtash Harandi. "Adaptive Poincaré Point to Set Distance for Few-Shot Classification". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 2 (28 de junho de 2022): 1926–34. http://dx.doi.org/10.1609/aaai.v36i2.20087.
Texto completo da fonteKim, Cheonshik, Nhu-Ngoc Dao, Ki-Hyun Jung e Lu Leng. "Dual Reversible Data Hiding in Encrypted Halftone Images Using Matrix Encoding". Electronics 12, n.º 14 (19 de julho de 2023): 3134. http://dx.doi.org/10.3390/electronics12143134.
Texto completo da fonteAlhaddad, Mohammed J., Monagi H. Alkinani, Mohammed Salem Atoum e Alaa Abdulsalm Alarood. "Evolutionary Detection Accuracy of Secret Data in Audio Steganography for Securing 5G-Enabled Internet of Things". Symmetry 12, n.º 12 (14 de dezembro de 2020): 2071. http://dx.doi.org/10.3390/sym12122071.
Texto completo da fonte