Статті в журналах з теми "Function-hiding"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Function-hiding".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Shin, Sang-Ho, and Jun-Cheol Jeon. "Lossless Data Hiding Technique using Reversible Function." International Journal of Security and Its Applications 8, no. 1 (January 31, 2014): 389–400. http://dx.doi.org/10.14257/ijsia.2014.8.1.36.
Повний текст джерелаWeiping Ni, and Jiqin Liu. "Function P-sets and Information Law Hiding-mining." Journal of Convergence Information Technology 8, no. 8 (April 30, 2013): 1021–29. http://dx.doi.org/10.4156/jcit.vol8.issue8.121.
Повний текст джерелаSun, Jie, ZhaoFang Yang, Yu Zhang, Teng Li, and Sha Wang. "High-Capacity Data Hiding Method Based on Two Subgroup Pixels-Value Adjustment Using Encoding Function." Security and Communication Networks 2022 (July 22, 2022): 1–14. http://dx.doi.org/10.1155/2022/4336526.
Повний текст джерелаTseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu, and Raylin Tso. "Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function." Security and Communication Networks 2021 (February 12, 2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.
Повний текст джерелаSabeen Govind, P. V., Bindiya M. Varghese, and M. V. Judy. "A high imperceptible data hiding technique using quorum function." Multimedia Tools and Applications 80, no. 13 (March 6, 2021): 20527–45. http://dx.doi.org/10.1007/s11042-021-10780-9.
Повний текст джерелаDanti, Ajit, and G. R. Manjula. "Secured Data Hiding based on Compression Function and Quantization." International Journal of Applied Information Systems 1, no. 2 (January 23, 2012): 53–58. http://dx.doi.org/10.5120/ijais12-450109.
Повний текст джерелаLee, Chin-Feng, and Hsing-Ling Chen. "A novel data hiding scheme based on modulus function." Journal of Systems and Software 83, no. 5 (May 2010): 832–43. http://dx.doi.org/10.1016/j.jss.2009.12.018.
Повний текст джерелаHorng, Ji-Hwei, Shuying Xu, Ching-Chun Chang, and Chin-Chen Chang. "An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu." Sensors 20, no. 9 (May 11, 2020): 2739. http://dx.doi.org/10.3390/s20092739.
Повний текст джерелаKhan, Sahib, Khalil Khan, Arslan Arif, Mahmoud Hassaballah, Jehad Ali, Qui Thanh Hoai Ta, and Lisu Yu. "A Modulo Function-Based Robust Asymmetric Variable Data Hiding Using DCT." Symmetry 12, no. 10 (October 12, 2020): 1659. http://dx.doi.org/10.3390/sym12101659.
Повний текст джерелаMelamed, Alexander. "A New Perspective on the Research of the Underground Complexes in Light of the Excavations at Nesher-Ramla Quarry." Jerusalem Journal of Archaeology 3, no. 2 (2022): 164–207. http://dx.doi.org/10.52486/01.00003.10.
Повний текст джерелаChan, Chi-Shiang. "On Using LSB Matching Function for Data Hiding in Pixels." Fundamenta Informaticae 96, no. 1-2 (2009): 49–59. http://dx.doi.org/10.3233/fi-2009-166.
Повний текст джерелаChang, Chin Chen, Chia Yin Lee, Chang Chu Chen, and Zhi Hui Wang. "A data-hiding scheme based on one-way hash function." International Journal of Multimedia Intelligence and Security 1, no. 3 (2010): 285. http://dx.doi.org/10.1504/ijmis.2010.037542.
Повний текст джерелаCHANG, YU-JIE, RAN-ZAN WANG, and JA-CHEN LIN. "HIDING IMAGES USING MODIFIED SEARCH-ORDER CODING AND MODULUS FUNCTION." International Journal of Pattern Recognition and Artificial Intelligence 22, no. 06 (September 2008): 1215–40. http://dx.doi.org/10.1142/s0218001408006740.
Повний текст джерелаChan, C. S., C. C. Chang, and Y. C. Hu. "Image hiding scheme using modulus function and optimal substitution table." Pattern Recognition and Image Analysis 16, no. 2 (April 2006): 208–17. http://dx.doi.org/10.1134/s1054661806020076.
Повний текст джерелаShi, KaiQuan, and JianLi Zhao. "Function S-rough sets and security-authentication of hiding law." Science in China Series F: Information Sciences 51, no. 7 (June 8, 2008): 924–35. http://dx.doi.org/10.1007/s11432-008-0062-9.
Повний текст джерелаZhang, LiGuo, XuDong Fu, and Jennifer G. Duan. "A surface-based hiding function linking flume and field data." Science China Technological Sciences 60, no. 10 (August 17, 2017): 1560–69. http://dx.doi.org/10.1007/s11431-016-0535-x.
Повний текст джерелаThien, Chih-Ching, and Ja-Chen Lin. "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function." Pattern Recognition 36, no. 12 (December 2003): 2875–81. http://dx.doi.org/10.1016/s0031-3203(03)00221-8.
Повний текст джерелаHuo, Weiwei, Zhenyao Cai, Jinlian Luo, Chenghao Men, and Ruiqian Jia. "Antecedents and intervention mechanisms: a multi-level study of R&D team’s knowledge hiding behavior." Journal of Knowledge Management 20, no. 5 (September 12, 2016): 880–97. http://dx.doi.org/10.1108/jkm-11-2015-0451.
Повний текст джерелаAbd El-Latif, Eman I., and M. I. Moussa. "Information hiding using artificial DNA sequences based on Gaussian kernel function." Journal of Information and Optimization Sciences 40, no. 6 (July 10, 2019): 1181–94. http://dx.doi.org/10.1080/02522667.2017.1413041.
Повний текст джерелаKuo, Wen-Chung, Shao-Hung Kuo, Chun-Cheng Wang, and Lih-Chyau Wuu. "High capacity data hiding scheme based on multi-bit encoding function." Optik 127, no. 4 (February 2016): 1762–69. http://dx.doi.org/10.1016/j.ijleo.2015.08.056.
Повний текст джерела徐, 茜茜. "Design and Implementation of Information Hiding Function Based on Sipdroid Platform." Software Engineering and Applications 06, no. 06 (2017): 163–71. http://dx.doi.org/10.12677/sea.2017.66018.
Повний текст джерелаKwon, Hyejin, Haemun Kim, and Soonja Kim. "A Data Hiding Scheme for Grayscale Images Using a Square Function." Journal of Korea Multimedia Society 17, no. 4 (April 30, 2014): 466–77. http://dx.doi.org/10.9717/kmms.2014.17.4.466.
Повний текст джерелаKhuda Bux, Naadiya, Mingming Lu, Jianxin Wang, Saajid Hussain, and Yazan Aljeroudi. "Efficient Association Rules Hiding Using Genetic Algorithms." Symmetry 10, no. 11 (November 2, 2018): 576. http://dx.doi.org/10.3390/sym10110576.
Повний текст джерелаWang, Chen, Chengyi Zeng, Hongfu Liu, and Jing Chen. "Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense." Electronics 10, no. 21 (October 26, 2021): 2614. http://dx.doi.org/10.3390/electronics10212614.
Повний текст джерелаMahajan, Apoorv, and Arpan Singh Rajput. "AN ENHANCED IMAGE STEGANOGRAPHY TECHNIQUE FOR HIGH-SECURITY COMMUNICATION." International Journal of Students' Research in Technology & Management 9, no. 2 (April 12, 2021): 1–6. http://dx.doi.org/10.18510/ijsrtm.2021.921.
Повний текст джерелаAmsaveni, A., and M. Bharathi. "Use of firefly optimization algorithm for fractional fourier transform based reversible data hiding." Journal of Intelligent & Fuzzy Systems 40, no. 1 (January 4, 2021): 415–25. http://dx.doi.org/10.3233/jifs-191911.
Повний текст джерелаKim, Young-Hun, Dae-Woon Lim, and Young-Sik Kim. "Design of Generalized Fluctuation Function for Reversible Data Hiding in Encrypted Image." Journal of Korean Institute of Communications and Information Sciences 41, no. 11 (November 30, 2016): 1329–40. http://dx.doi.org/10.7840/kics.2016.41.11.1329.
Повний текст джерелаPENDER, G., and Q. LI. "COMPARISON OF TWO HIDING FUNCTION FORMULATIONS FOR NON-UNIFORM SEDIMENT TRANSPORT CALCULATIONS." Proceedings of the Institution of Civil Engineers - Water Maritime and Energy 112, no. 2 (June 1995): 127–35. http://dx.doi.org/10.1680/iwtme.1995.27658.
Повний текст джерелаLu, Tzu-Chuen. "Interpolation-based hiding scheme using the modulus function and re-encoding strategy." Signal Processing 142 (January 2018): 244–59. http://dx.doi.org/10.1016/j.sigpro.2017.07.025.
Повний текст джерелаManiriho, Pascal, and Tohari Ahmad. "Information hiding scheme for digital images using difference expansion and modulus function." Journal of King Saud University - Computer and Information Sciences 31, no. 3 (July 2019): 335–47. http://dx.doi.org/10.1016/j.jksuci.2018.01.011.
Повний текст джерелаTomida, Junichi. "Tightly secure inner product functional encryption: Multi-input and function-hiding constructions." Theoretical Computer Science 833 (September 2020): 56–86. http://dx.doi.org/10.1016/j.tcs.2020.05.008.
Повний текст джерела申, 淑媛. "An Information Hiding Algorithm Based on Pixel Di?erence and Index Function." Computer Science and Application 07, no. 10 (2017): 913–26. http://dx.doi.org/10.12677/csa.2017.710104.
Повний текст джерелаChe, Sheng Bing, Dong Mei Guo, Ye Mao Wang, and Li Li Pan. "A Software Watermarking Algorithm Based on Binder Technology." Applied Mechanics and Materials 687-691 (November 2014): 2971–74. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2971.
Повний текст джерелаPurba, Ronsen, Irpan Pardosi, Harry Darmawan, and Aldo Alex Sitorus. "Pengamanan Data Teks Dengan NTRU dan Modulus Function pada Koefisien IHWT Citra Warna." Jurnal SIFO Mikroskil 20, no. 1 (April 4, 2019): 59–70. http://dx.doi.org/10.55601/jsm.v20i1.649.
Повний текст джерелаLin, Chun-Wei, Binbin Zhang, Kuo-Tung Yang, and Tzung-Pei Hong. "Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/398269.
Повний текст джерелаLin, Chia-Chen, Chin-Chen Chang, Wei-Jiun Kao, and Jui-Feng Chang. "Efficient Electronic Patient Information Hiding Scheme With Tamper Detection Function for Medical Images." IEEE Access 10 (2022): 18470–85. http://dx.doi.org/10.1109/access.2022.3144322.
Повний текст джерелаShin, Jeongmi, and Yeonseung Ryu. "Sensitive Data Hiding Scheme for Internet of Things using Function Call Obfuscation Techniques." International Journal of Security and Its Applications 10, no. 10 (October 31, 2016): 169–80. http://dx.doi.org/10.14257/ijsia.2016.10.10.16.
Повний текст джерелаChang, Chin-Chen, Chi-Shiang Chan, and Yi-Hsuan Fan. "Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels." Pattern Recognition 39, no. 6 (June 2006): 1155–67. http://dx.doi.org/10.1016/j.patcog.2005.12.011.
Повний текст джерелаSahu, Aditya Kumar, and Gandharba Swain. "An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function." Wireless Personal Communications 108, no. 1 (April 23, 2019): 159–74. http://dx.doi.org/10.1007/s11277-019-06393-z.
Повний текст джерелаHuang, Lu-Chou, Huei-Chung Chu, Chung-Yueh Lien, Chia-Hung Hsiao, and Tsair Kao. "Embedding a Hiding Function in a Portable Electronic Health Record for Privacy Preservation." Journal of Medical Systems 34, no. 3 (December 23, 2008): 313–20. http://dx.doi.org/10.1007/s10916-008-9243-8.
Повний текст джерелаHaitner, Iftach, Minh-Huyen Nguyen, Shien Jin Ong, Omer Reingold, and Salil Vadhan. "Statistically Hiding Commitments and Statistical Zero-Knowledge Arguments from Any One-Way Function." SIAM Journal on Computing 39, no. 3 (January 2009): 1153–218. http://dx.doi.org/10.1137/080725404.
Повний текст джерелаDubuquoy, Céline, Anne-Françoise Burnol, and Marthe Moldes. "PNPLA3, a genetic marker of progressive liver disease, still hiding its metabolic function?" Clinics and Research in Hepatology and Gastroenterology 37, no. 1 (February 2013): 30–35. http://dx.doi.org/10.1016/j.clinre.2012.06.014.
Повний текст джерелаKim, Young-Hun, Dae-Woon Lim, and Young-Sik Kim. "Design of Fluctuation Function to Improve BER Performance of Data Hiding in Encrypted Image." Journal of Korean Institute of Communications and Information Sciences 41, no. 3 (March 31, 2016): 307–16. http://dx.doi.org/10.7840/kics.2016.41.3.307.
Повний текст джерелаMaleki, Najme, Mehrdad Jalali, and Majid Vafaei Jahan. "Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function." Egyptian Informatics Journal 15, no. 2 (July 2014): 115–27. http://dx.doi.org/10.1016/j.eij.2014.06.001.
Повний текст джерелаDi, Fuqiang, Minqing Zhang, Fangjun Huang, Jia Liu, and Yongjun Kong. "Reversible data hiding in JPEG images based on zero coefficients and distortion cost function." Multimedia Tools and Applications 78, no. 24 (August 21, 2019): 34541–61. http://dx.doi.org/10.1007/s11042-019-08109-8.
Повний текст джерелаHoyos, Beatrice, Rebeca Acin-Perez, Donald A. Fischman, Giovanni Manfredi, and Ulrich Hammerling. "Hiding in plain sight: Uncovering a new function of vitamin A in redox signaling." Biochimica et Biophysica Acta (BBA) - Molecular and Cell Biology of Lipids 1821, no. 1 (January 2012): 241–47. http://dx.doi.org/10.1016/j.bbalip.2011.06.014.
Повний текст джерелаLin, Yu-Hsiu, Chih-Hsien Hsia, Bo-Yan Chen, and Yung-Yao Chen. "Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy." Sensors 19, no. 9 (April 27, 2019): 1974. http://dx.doi.org/10.3390/s19091974.
Повний текст джерелаKordov, Krasimir, and Borislav Stoyanov. "Least Significant Bit Steganography using Hitzl-Zele Chaotic Map." International Journal of Electronics and Telecommunications 63, no. 4 (November 27, 2017): 417–22. http://dx.doi.org/10.1515/eletel-2017-0061.
Повний текст джерелаSaunoriene, Loreta, Kamilija Jablonskaite, Jurate Ragulskiene, and Minvydas Ragulskis. "Information Hiding Based on Statistical Features of Self-Organizing Patterns." Entropy 24, no. 5 (May 12, 2022): 684. http://dx.doi.org/10.3390/e24050684.
Повний текст джерелаMasoumzadeh, N., L. Kolokolova, C. Tubiana, M. R. El-Maarry, S. Mottola, C. Güttler, C. Snodgrass, et al. "Phase-curve analysis of comet 67P/Churyumov-Gerasimenko at small phase angles." Astronomy & Astrophysics 630 (September 20, 2019): A11. http://dx.doi.org/10.1051/0004-6361/201834845.
Повний текст джерела