咨询与建议

限定检索结果

文献类型

  • 18 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 18 篇 计算机科学与技术...
    • 17 篇 电气工程
    • 11 篇 软件工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 生物学

主题

  • 24 篇 absolute moment ...
  • 5 篇 image compressio...
  • 4 篇 data hiding
  • 3 篇 block truncation...
  • 3 篇 tamper detection
  • 3 篇 meaningful shado...
  • 3 篇 image authentica...
  • 3 篇 rivest cipher 4
  • 2 篇 secret sharing
  • 2 篇 digital watermar...
  • 2 篇 medical image
  • 2 篇 secret data
  • 2 篇 image coding
  • 2 篇 entropy coding
  • 2 篇 redundant discre...
  • 2 篇 visual secret sh...
  • 2 篇 high payload
  • 2 篇 smooth block
  • 1 篇 turtle shell-bas...
  • 1 篇 hiding capacity

机构

  • 3 篇 feng chia univ d...
  • 2 篇 asia univ dept c...
  • 2 篇 providence univ ...
  • 2 篇 sun yat sen univ...
  • 2 篇 chinese culture ...
  • 2 篇 sun yat sen univ...
  • 2 篇 feng chia univ d...
  • 2 篇 univ kasdi merba...
  • 1 篇 chung chou inst ...
  • 1 篇 chinese acad sci...
  • 1 篇 chung yuan chris...
  • 1 篇 chaoyang univ te...
  • 1 篇 ming chi univ te...
  • 1 篇 natl taipei univ...
  • 1 篇 xi an jiao tong ...
  • 1 篇 comp mot inc gol...
  • 1 篇 feng chia univ d...
  • 1 篇 natl chiao tung ...
  • 1 篇 univ shanghai sc...
  • 1 篇 asia univ dept c...

作者

  • 5 篇 chang chin-chen
  • 3 篇 lin chia-chen
  • 2 篇 ou duanhao
  • 2 篇 bilel maghni
  • 2 篇 verma harsh k.
  • 2 篇 sun wei
  • 2 篇 tai wei-liang
  • 2 篇 malik aruna
  • 2 篇 khaldi amine
  • 2 篇 huang yuehong
  • 2 篇 sikka geeta
  • 1 篇 mao qian
  • 1 篇 chen shih-lun
  • 1 篇 sun xingming
  • 1 篇 cheng ting-fang
  • 1 篇 wang shudong
  • 1 篇 redouane kafi mo...
  • 1 篇 lu yuliang
  • 1 篇 li longlong
  • 1 篇 mohammad nur

语言

  • 24 篇 英文
检索条件"主题词=Absolute moment block truncation coding"
24 条 记 录,以下是11-20 订阅
排序:
AMBTC-based visual secret sharing with different meaningful shadows
收藏 引用
MATHEMATICAL BIOSCIENCES AND ENGINEERING 2021年 第5期18卷 5236-5251页
作者: Wang, Shudong Lu, Yuliang Yan, Xuehu Li, Longlong Yu, Yongqiang Natl Univ Def Technol Hefei 230037 Peoples R China Anhui Key Lab Cyberspace Secur Situat Awareness & Hefei 230037 Peoples R China
Secret sharing based on absolute moment block truncation coding (AMBTC) has been widely studied. However, the management of stego images is inconvenient as they seem indistinguishable. Moreover, there exists a problem... 详细信息
来源: 评论
A redundant wavelet based medical image watermarking scheme for secure transmission in telemedicine applications
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第5期82卷 7901-7915页
作者: Amine, Khaldi Redouane, Kafi Bilel, Maghni Univ Kasdi Merbah Fac Sci & Technol Comp Sci Dept Artificial Intelligence & Informat Technol Lab LI Ouargla 30000 Algeria Univ Kasdi Merbah Fac Sci & Technol Elect Dept Elect Engn Lab Ouargla 30000 Algeria Badji Mokhtar Annaba Univ Fac Engn Sci Dept Elect Engn LSEM Lab Annaba 23000 Algeria
Watermarking is a method of protecting multimedia material, especially images, from malicious attacks by embedding a fingerprint. Whenever it comes to sensitive pictures, such as medical images, traditional watermarki... 详细信息
来源: 评论
A high payload data hiding scheme based on modified AMBTC technique
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2017年 第12期76卷 14151-14167页
作者: Malik, Aruna Sikka, Geeta Verma, Harsh K. Natl Inst Technol Dept Comp Sci & Engn Jalandhar India
In this paper, we propose a data hiding scheme which uses our modified AMBTC compression technique for embedding the secret data. Our modified AMBTC technique converts the one bit plane into two bit plane which helps ... 详细信息
来源: 评论
Reversible AMBTC-based secret sharing scheme with abilities of two decryptions
收藏 引用
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION 2014年 第5期25卷 1222-1239页
作者: Ou, Duanhao Sun, Wei Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou Guangdong Peoples R China Sun Yat Sen Univ Sch Software Guangzhou 510006 Guangdong Peoples R China
This paper presents a secret sharing scheme to encode a secret binary image in images which are compressed by absolute moment block truncation coding (AMBTC) method. The generated shadows by the proposed scheme are in... 详细信息
来源: 评论
An AMBTC compression based data hiding scheme using pixel value adjusting strategy
收藏 引用
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING 2018年 第4期29卷 1801-1818页
作者: Malik, Aruna Sikka, Geeta Verma, Harsh K. Natl Inst Technol Dept Comp Sci & Engn Jalandhar 144011 Punjab India
Image steganography is one of the most important research areas of information security where secret data is embedded in the images to conceal its existence while getting the minimum possible statistical detectability... 详细信息
来源: 评论
Improve Information Rate in Thien and Lin's Image Secret Sharing Scheme Using Huffman coding Technique
Improve Information Rate in Thien and Lin's Image Secret Sha...
收藏 引用
3rd International Conference on Computing, Communication, Control and Automation (ICCUBEA)
作者: Markandeya, Nehal Patil, Sonali Pimpri Chinchwad Coll Engn Dept Comp Engn Pune 44 Maharashtra India
Shares in image secret sharing play a vital role. These image shares has size greater than or equal to size of original image, it require high bandwidth while transmission. Because of the excessive bandwidth requireme... 详细信息
来源: 评论
Applying Histogram Modification to Embed Secret Message in AMBTC  10
Applying Histogram Modification to Embed Secret Message in A...
收藏 引用
10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
作者: Chang, Chin-Chen Wu, Hsiao-Ling Chung, Ting-Feng Feng Chia Univ Dept Informat Engn & Comp Sci Taichung 40724 Taiwan Asia Univ Dept Comp Sci & Informat Engn Taichung Taiwan
In 2014, Lo et al. employs the histogram shifting technique to present a reversible data hiding scheme for the "absolute moment block truncation coding image" (AMBTC). In their scheme, the secret message is ... 详细信息
来源: 评论
A Low-Complexity Color Image Compression Algorithm Based on AMBTC  6
A Low-Complexity Color Image Compression Algorithm Based on ...
收藏 引用
IEEE International Conference on Consumer Electronics-Taiwan (IEEE ICCE-TW)
作者: Cheng, Hsiao-Hsuan Chen, Chiung-An Lee, Lung-Jen Lin, Ting-Lan Chiou, Yih-Shyh Chen, Shih-Lun Chung Yuan Christian Univ Dept Elect Engn Taoyuan Taiwan Ming Chi Univ Technol Dept Elect Engn New Taipei Taiwan Army Acad Dept Elect Engn Taoyuan Taiwan Natl Taipei Univ Technol Dept Elect Engn Taipei Taiwan
In this paper, a new color image compression algorithm based on absolute moment block truncation coding (AMBTC) and entropy coding is proposed. The AMBTC improves the compression performance of block truncation coding... 详细信息
来源: 评论
A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images  13th
A Novel Hybrid Image Authentication Scheme for AMBTC-Compres...
收藏 引用
13th International Workshop on Digital-Forensics and Watermarking (IWDW)
作者: Lin, Chia-Chen Huang, Yuehong Tai, Wei-Liang Providence Univ Dept Comp Sci & Informat Management Taichung Taiwan Chinese Culture Univ Dept Informat Commun Taipei Taiwan
A novel hybrid image authentication scheme is proposed in this paper to protect the integrity of images that are compressed by absolute moment block truncation coding (AMBTC). In this proposed scheme, all blocks of a ... 详细信息
来源: 评论
A reversible data hiding method based on bitmap prediction for AMBTC compressed hyperspectral images
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2024年 81卷
作者: Zhang, Xiaoran Pan, Zhibin Zhou, Quan Fan, Guojun Dong, Jing State Grid Jiangsu Elect Power Co Ltd Nanjing Power Supply Co Nanjing 210019 Jiangsu Peoples R China Xi An Jiao Tong Univ Fac Elect & Informat Engn Xian 710049 Shaanxi Peoples R China Xian Inst Space Radio Technol Natl Key Lab Sci & Technol Space Microwave Xian 710100 Shaanxi Peoples R China Chinese Acad Sci Inst Automat Natl Lab Pattern Recognit Beijing 100190 Peoples R China Chinese Acad Sci State Key Lab Transient Opt & Photon Beijing 100190 Peoples R China
In the transmission of hyperspectral images that have been compressed using absolute moment block truncation coding (AMBTC), confidentiality and security of crucial information is often a concern. Although many data h... 详细信息
来源: 评论