Статті в журналах з теми "Embedding a vector of bits"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Embedding a vector of bits".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Yang, Zekun, and Juan Feng. "A Causal Inference Method for Reducing Gender Bias in Word Embedding Relations." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 9434–41. http://dx.doi.org/10.1609/aaai.v34i05.6486.
Повний текст джерелаLee, Jiann-Der, Yaw-Hwang Chiou, and Jing-Ming Guo. "Reversible Data Hiding Scheme with High Embedding Capacity Using Semi-Indicator-Free Strategy." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/476181.
Повний текст джерелаD R, Vinay, and Ananda Babu J. "A Novel Secure Data Hiding Technique into Video Sequences Using RVIHS." International Journal of Computer Network and Information Security 13, no. 2 (April 8, 2021): 53–65. http://dx.doi.org/10.5815/ijcnis.2021.02.05.
Повний текст джерелаLauscher, Anne, Goran Glavaš, Simone Paolo Ponzetto, and Ivan Vulić. "A General Framework for Implicit and Explicit Debiasing of Distributional Word Vector Spaces." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 8131–38. http://dx.doi.org/10.1609/aaai.v34i05.6325.
Повний текст джерелаTissier, Julien, Christophe Gravier, and Amaury Habrard. "Near-Lossless Binarization of Word Embeddings." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 7104–11. http://dx.doi.org/10.1609/aaai.v33i01.33017104.
Повний текст джерелаK., Akubuilo, and Rix Torimiro. "LARGE DATA EMBEDDING; PROBLEM & SOLUTION." Engineering Science & Technology Journal 1, no. 2 (December 29, 2019): 18–22. http://dx.doi.org/10.51594/estj.v1i2.114.
Повний текст джерелаCao, Fang, Yujie Fu, Heng Yao, Mian Zou, Jian Li, and Chuan Qin. "Separable Reversible Data Hiding in Encrypted VQ-Encoded Images." Security and Communication Networks 2022 (April 23, 2022): 1–16. http://dx.doi.org/10.1155/2022/1227926.
Повний текст джерелаSubramanian, Maheswari, and Reeba Korah. "A Framework of Secured Embedding Scheme Using Vector Discrete Wavelet Transformation and Lagrange Interpolation." Journal of Computer Networks and Communications 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/8695103.
Повний текст джерелаTang, Chun Ge, Tie Sheng Fan, Lei Liu, and Zhi Hui Li. "Blind Digital Image Watermarking Algorithm Based on the Chain Code." Advanced Materials Research 546-547 (July 2012): 410–15. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.410.
Повний текст джерелаVoyiatzis, Ioannis. "A Low-Cost BIST Scheme for Test Vector Embedding in Accumulator-Generated Sequences." VLSI Design 2008 (March 17, 2008): 1–8. http://dx.doi.org/10.1155/2008/680157.
Повний текст джерелаHou, Xiang, Lianquan Min, and Hui Yang. "A Reversible Watermarking Scheme for Vector Maps Based on Multilevel Histogram Modification." Symmetry 10, no. 9 (September 12, 2018): 397. http://dx.doi.org/10.3390/sym10090397.
Повний текст джерелаGong, Cheng, Jingbing Li, Uzair Aslam Bhatti, Ming Gong, Jixin Ma, and Mengxing Huang. "Robust and Secure Zero-Watermarking Algorithm for Medical Images Based on Harris-SURF-DCT and Chaotic Map." Security and Communication Networks 2021 (November 3, 2021): 1–13. http://dx.doi.org/10.1155/2021/3084153.
Повний текст джерелаNematollahi, Mohammad Ali, Chalee Vorakulpipat, and Hamurabi Gamboa Rosales. "Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/5454768.
Повний текст джерелаKang, Jinwoo, Hyunjung Kim, and Sang-ug Kang. "Genuine Reversible Data Hiding Technique for H.264 Bitstream Using Multi-Dimensional Histogram Shifting Technology on QDCT Coefficients." Applied Sciences 10, no. 18 (September 14, 2020): 6410. http://dx.doi.org/10.3390/app10186410.
Повний текст джерелаKumar, Vaibhav, Tenzin Singhay Bhotia, Vaibhav Kumar, and Tanmoy Chakraborty. "Nurse is Closer to Woman than Surgeon? Mitigating Gender-Biased Proximities in Word Embeddings." Transactions of the Association for Computational Linguistics 8 (August 2020): 486–503. http://dx.doi.org/10.1162/tacl_a_00327.
Повний текст джерелаJasim, Abbas. "Image Hiding Using Variable Length Least Significant Bits Embedding." Iraqi Journal for Electrical and Electronic Engineering 10, no. 1 (June 1, 2014): 15–23. http://dx.doi.org/10.37917/ijeee.10.1.2.
Повний текст джерелаSao, Nguyen Kim, Nguyen Ngoc Hoa, and Pham Van At. "AN EFFECTIVE REVERSIBLE DATA HIDING METHOD BASED ON PIXEL-VALUE-ORDERING." Journal of Computer Science and Cybernetics 36, no. 2 (May 11, 2020): 139–58. http://dx.doi.org/10.15625/1813-9663/36/2/14084.
Повний текст джерелаGALKA, ANDREAS, and GERD PFISTER. "DYNAMICAL CORRELATIONS ON RECONSTRUCTED INVARIANT DENSITIES AND THEIR EFFECT ON CORRELATION DIMENSION ESTIMATION." International Journal of Bifurcation and Chaos 13, no. 03 (March 2003): 723–32. http://dx.doi.org/10.1142/s0218127403006881.
Повний текст джерелаUlčar, Matej, Anka Supej, Marko Robnik-Šikonja, and Senja Pollak. "Slovene and Croatian word embeddings in terms of gender occupational analogies." Slovenščina 2.0: empirical, applied and interdisciplinary research 9, no. 1 (July 6, 2021): 26–59. http://dx.doi.org/10.4312/slo2.0.2021.1.26-59.
Повний текст джерелаYang, Jun De, Zhong Ping Luo, Fan Lu, and Yuan Wang. "Research on Embedding Strength of Diamond." Key Engineering Materials 480-481 (June 2011): 560–67. http://dx.doi.org/10.4028/www.scientific.net/kem.480-481.560.
Повний текст джерелаBray, Elizabeth. "Fixing and Embedding Protocol for Octocorals and Their Sclerites." Microscopy Today 9, no. 2 (March 2001): 33. http://dx.doi.org/10.1017/s1551929500056467.
Повний текст джерелаXiao, Hong, and Panchi Li. "Quantum steganography based on reflected gray code for color images." Intelligent Decision Technologies 14, no. 3 (September 29, 2020): 291–312. http://dx.doi.org/10.3233/idt-190034.
Повний текст джерелаSaini, Mangat, and Pratibha. "A Review on Various Approaches of Image Steganography and Data Security." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (January 30, 2018): 102. http://dx.doi.org/10.23956/ijarcsse.v8i1.532.
Повний текст джерелаZakaria, Abdul, Mehdi Hussain, Ainuddin Wahab, Mohd Idris, Norli Abdullah, and Ki-Hyun Jung. "High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution." Applied Sciences 8, no. 11 (November 9, 2018): 2199. http://dx.doi.org/10.3390/app8112199.
Повний текст джерелаYongjun, Kong, Zhang Minqing, Wang Zexi, Ke Yan, and Huang Siyuan. "Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process." Security and Communication Networks 2022 (May 12, 2022): 1–17. http://dx.doi.org/10.1155/2022/6299469.
Повний текст джерелаWang, Haoye, Xin Xia, David Lo, Qiang He, Xinyu Wang, and John Grundy. "Context-aware Retrieval-based Deep Commit Message Generation." ACM Transactions on Software Engineering and Methodology 30, no. 4 (July 2021): 1–30. http://dx.doi.org/10.1145/3464689.
Повний текст джерелаTiwari, Dhananjay. "Improving signal-to-noise ratio of magnetic tunnel junction based radio frequency detector via spin-torque ferromagnetic resonance." Review of Scientific Instruments 93, no. 5 (May 1, 2022): 053904. http://dx.doi.org/10.1063/5.0087860.
Повний текст джерелаKer, Andrew D. "Steganalysis of Embedding in Two Least-Significant Bits." IEEE Transactions on Information Forensics and Security 2, no. 1 (March 2007): 46–54. http://dx.doi.org/10.1109/tifs.2006.890519.
Повний текст джерелаWang, Jijun, and Soo Fun Tan. "Separable Reversible Data Hiding in Encryption Image with Two-Tuples Coding." Computers 10, no. 7 (July 7, 2021): 86. http://dx.doi.org/10.3390/computers10070086.
Повний текст джерелаZhou, RiGui, YouDe Cheng, Hou Ian, and XingAo Liu. "Quantum watermarking algorithm based on chaotic affine scrambling." International Journal of Quantum Information 17, no. 04 (June 2019): 1950038. http://dx.doi.org/10.1142/s0219749919500382.
Повний текст джерелаYu, Lifang, Yun Q. Shi, Yao Zhao, Rongrong Ni, and Gang Cao. "A Study on Embedding Efficiency of Matrix Encoding." International Journal of Digital Crime and Forensics 4, no. 1 (January 2012): 37–48. http://dx.doi.org/10.4018/jdcf.2012010103.
Повний текст джерелаSwain, Gandharba, and Saroj Kumar Lenka. "A Robust Image Steganography Technique Using Dynamic Embedding with Two Least Significant Bits." Advanced Materials Research 403-408 (November 2011): 835–41. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.835.
Повний текст джерелаTian, Hui, Jie Qin, Yongfeng Huang, Xu An Wang, Jin Liu, Yonghong Chen, Tian Wang, and Yiqiao Cai. "A High-Capacity Covering Code for Voice-Over-IP Steganography." International Journal of Information Technology and Web Engineering 10, no. 3 (July 2015): 46–63. http://dx.doi.org/10.4018/ijitwe.2015070104.
Повний текст джерелаLee, Chin-Feng, Jau-Ji Shen, Somya Agrawal, and Yen-Hsi Li. "High-Capacity Embedding Method Based on Double-Layer Octagon-Shaped Shell Matrix." Symmetry 13, no. 4 (April 1, 2021): 583. http://dx.doi.org/10.3390/sym13040583.
Повний текст джерелаTieqiao Liu, Jishun Kuang, Weizheng Wang, Zhiqiang You, and Shuo Cai. "Embedding N-Detect Test Set into Controlled Bits Stream." International Journal of Digital Content Technology and its Applications 5, no. 10 (October 31, 2011): 271–78. http://dx.doi.org/10.4156/jdcta.vol5.issue10.31.
Повний текст джерелаYang, Chunfang, Fenlin Liu, Xiangyang Luo, and Bin Liu. "Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits." IEEE Transactions on Information Forensics and Security 3, no. 4 (December 2008): 662–72. http://dx.doi.org/10.1109/tifs.2008.2007240.
Повний текст джерелаA. Jasim, Abbas. "Image Hiding Using Variable Length Least Significant Bits Embedding." Iraqi Journal for Electrical And Electronic Engineering 10, no. 1 (June 28, 2014): 15–23. http://dx.doi.org/10.33762/eeej.2014.93014.
Повний текст джерелаAdi, Prajanto Wahyu, Yani Parti Astuti, and Egia Rosi Subhiyakto. "Feature Image Watermarking Based on Bicubic Interpolation of Wavelet Coefficients Using CRT." CommIT (Communication and Information Technology) Journal 11, no. 2 (October 31, 2017): 93. http://dx.doi.org/10.21512/commit.v11i2.3870.
Повний текст джерелаLiang, Zhuoqian, Bingwen Feng, Xuba Xu, Xiaotian Wu, and Tao Yang. "Geometrically Invariant Image Watermarking Using Histogram Adjustment." International Journal of Digital Crime and Forensics 10, no. 1 (January 2018): 54–66. http://dx.doi.org/10.4018/ijdcf.2018010105.
Повний текст джерелаLee, Chin-Feng, and Hua-Zhe Wu. "High-Capacity and High-Quality Reversible Data Hiding Method Using Recurrent Round-Trip Embedding Strategy in the Quotient Image." Applied Sciences 11, no. 21 (October 29, 2021): 10157. http://dx.doi.org/10.3390/app112110157.
Повний текст джерелаKhan, Sahib, Khalil Khan, Farman Ali, and Kyung-Sup Kwak. "Forgery Detection and Localization of Modifications at the Pixel Level." Symmetry 12, no. 1 (January 9, 2020): 137. http://dx.doi.org/10.3390/sym12010137.
Повний текст джерелаZhang, Wen-Rong, and Yuh-Ming Huang. "An Improved Product Code-Based Data Hiding Scheme." Applied Sciences 8, no. 11 (November 1, 2018): 2119. http://dx.doi.org/10.3390/app8112119.
Повний текст джерелаWang, Dewang, Xianquan Zhang, Chunqiang Yu, and Zhenjun Tang. "Reversible Data Hiding in Encrypted Image Based on Multi-MSB Embedding Strategy." Applied Sciences 10, no. 6 (March 18, 2020): 2058. http://dx.doi.org/10.3390/app10062058.
Повний текст джерелаXia, Xue Wen, Zeng Gang Xiong, and Zhi Ming Li. "Self-Embedding Watermark for Image Restoration Based on Repeat Correcting Code." Advanced Materials Research 219-220 (March 2011): 66–70. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.66.
Повний текст джерелаHasmawati, Hasmawati, and Ari Moesriami Barmawi. "Increasing The Capacity of Headstega Based on Bitwise Operation." Jurnal Ilmu Komputer dan Informasi 14, no. 2 (July 4, 2021): 113–26. http://dx.doi.org/10.21609/jiki.v14i2.957.
Повний текст джерелаClark, T. E., S. T. Love, Muneto Nitta, T. ter Veldhuis, and Chi Xiong. "Brane vector dynamics from embedding geometry." Nuclear Physics B 810, no. 1-2 (March 2009): 97–114. http://dx.doi.org/10.1016/j.nuclphysb.2008.10.017.
Повний текст джерелаLee, Kong Aik, Qiongqiong Wang, and Takafumi Koshinaka. "Xi-Vector Embedding for Speaker Recognition." IEEE Signal Processing Letters 28 (2021): 1385–89. http://dx.doi.org/10.1109/lsp.2021.3091932.
Повний текст джерелаKim, Cheonshik, Ching-Nung Yang, and Lu Leng. "High-Capacity Data Hiding for ABTC-EQ Based Compressed Image." Electronics 9, no. 4 (April 14, 2020): 644. http://dx.doi.org/10.3390/electronics9040644.
Повний текст джерелаXin, Guojiang, Yuling Liu, Ting Yang, and Yu Cao. "An Adaptive Audio Steganography for Covert Wireless Communication." Security and Communication Networks 2018 (August 16, 2018): 1–10. http://dx.doi.org/10.1155/2018/7096271.
Повний текст джерелаBoostani, R., and M. Sabeti. "MULTI-CHANNEL ECG-BASED STEGANOGRAPHY." Biomedical Engineering: Applications, Basis and Communications 30, no. 06 (November 29, 2018): 1850046. http://dx.doi.org/10.4015/s1016237218500461.
Повний текст джерела