咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 8 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 电气工程
  • 5 篇 理学
    • 5 篇 数学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 14 篇 block complexity
  • 5 篇 subshift
  • 4 篇 automorphism
  • 3 篇 reversible data ...
  • 2 篇 pixel value orde...
  • 2 篇 syndrome trellis...
  • 2 篇 steganography
  • 2 篇 pixel selection
  • 1 篇 information hidi...
  • 1 篇 kolmogorov compl...
  • 1 篇 image encryption
  • 1 篇 adaptive stegano...
  • 1 篇 interval exchang...
  • 1 篇 edge
  • 1 篇 minimal pattern ...
  • 1 篇 improved pixel v...
  • 1 篇 quad-tree
  • 1 篇 matrix embedding
  • 1 篇 maximal pattern ...
  • 1 篇 amenable

机构

  • 4 篇 bucknell univ le...
  • 4 篇 northwestern uni...
  • 2 篇 nanjing univ sci...
  • 1 篇 chaoyang univ te...
  • 1 篇 department of in...
  • 1 篇 satakedai 5-9-6 ...
  • 1 篇 sri sivasubraman...
  • 1 篇 natl chung hsing...
  • 1 篇 huawei technol c...
  • 1 篇 school of electr...
  • 1 篇 department of co...
  • 1 篇 northwestern uni...
  • 1 篇 hunan police aca...
  • 1 篇 univ montpellier...
  • 1 篇 department of co...
  • 1 篇 school of automa...
  • 1 篇 univ montpellier...
  • 1 篇 jiangsu univ sci...
  • 1 篇 engn univ chines...
  • 1 篇 univ picardie ju...

作者

  • 5 篇 kra bryna
  • 5 篇 cyr van
  • 2 篇 liu weiwei
  • 2 篇 dai yuewei
  • 2 篇 liu guangjie
  • 1 篇 di fuqiang
  • 1 篇 yang cheng-hsing
  • 1 篇 sharmila t. sree
  • 1 篇 roselinkiruba r.
  • 1 篇 zhang minqing
  • 1 篇 lin zong-ye
  • 1 篇 guangjie liu
  • 1 篇 shen qingqing
  • 1 篇 hung chia-ling
  • 1 篇 yuewei dai
  • 1 篇 destombes julien
  • 1 篇 liu jia
  • 1 篇 lee chin-feng
  • 1 篇 shen jau-ji
  • 1 篇 weiwei liu

语言

  • 13 篇 英文
  • 1 篇 其他
检索条件"主题词=Block complexity"
14 条 记 录,以下是1-10 订阅
排序:
Efficient reversible data hiding in encrypted images using block complexity and most significant bit inversion strategy
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Yang, Cheng-Hsing Weng, Chi-Yao Hung, Chia-Ling WANG, Shiuh-Jeng Department of Computer Science and Artificial Intelligence National Pingtung University Pingtung900 Taiwan Department of Computer Science and Information Engineering National Chiayi University Chiayi600 Taiwan Department of Information Management Central Police University Taoyuan City333 Taiwan
Reversible data hiding in the encrypted images (RDHEI) has attracted more attention because RDHEI can be used for both information protection and image encryption. Many researches based on RDHEI have been proposed by ... 详细信息
来源: 评论
A novel data hiding by image interpolation using edge quad-tree block complexity
收藏 引用
VISUAL COMPUTER 2023年 第1期39卷 59-72页
作者: RoselinKiruba, R. Sharmila, T. Sree Sri Sivasubramaniya Nadar Coll Engn Dept Informat Technol Chennai Tamil Nadu India
Data hiding method embed secret data inside a cover medium. Image quality and capacity plays a significant role in the performance of data hiding. The motivation of this paper is to improve the interpolation technique... 详细信息
来源: 评论
Adaptive steganography based on block complexity and matrix embedding
收藏 引用
MULTIMEDIA SYSTEMS 2014年 第2期20卷 227-238页
作者: Liu, Guangjie Liu, Weiwei Dai, Yuewei Lian, Shiguo Nanjing Univ Sci & Technol Sch Automat Nanjing Jiangsu Peoples R China Huawei Technol Cent Res Inst Beijing Peoples R China
In this paper, an adaptive steganography algorithm based on block complexity and matrix embedding is proposed. The matrix embedding constructed by [8,3], [8,4] [8,5] [8,6] and [8,7] linear codes is taken as the basic ... 详细信息
来源: 评论
Strong approximations of shifts and the characteristic measures problem
收藏 引用
MATHEMATISCHE ZEITSCHRIFT 2025年 第1期309卷 1-28页
作者: Cyr, Van Kra, Bryna Petite, Samuel Bucknell Univ Lewisburg PA 17837 USA Northwestern Univ Evanston IL 60208 USA Univ Picardie Jules Verne F-80039 Amiens France
Every symbolic system supports a Borel measure that is invariant under the shift, but it is not known if every such systems supports a measure that is invariant under all of its automorphisms, known as a characteristi... 详细信息
来源: 评论
Characteristic measures for language stable subshifts
收藏 引用
MONATSHEFTE FUR MATHEMATIK 2023年 第3期201卷 659-701页
作者: Cyr, Van Kra, Bryna Bucknell Univ Lewisburg PA 17837 USA Northwestern Univ Evanston IL 60208 USA
We consider the problem of when a symbolic dynamical system supports a Borel probability measure that is invariant under every element of its automorphism group. It follows readily from a classical result of Parry tha... 详细信息
来源: 评论
Bin Reservation Based on IVPO Reversible Data Hiding Using Smoothness Mode Selection Strategy  17th
Bin Reservation Based on IVPO Reversible Data Hiding Using S...
收藏 引用
17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) / 14th International Conference on Frontiers of Information Technology, Applications and Tools (FITAT)
作者: Lee, Chin-Feng Shen, Jau-Ji Lin, Zong-Ye Chaoyang Univ Technol Dept Informat Management Taichung 41349 Taiwan Natl Chung Hsing Univ Dept Management Informat Syst Taichung 40277 Taiwan
Pixel value ordering (PVO) is a popular reversible data hiding (RDH) technology. The embedding strategy of the PVO method is to divide the image into blocks of the same size, sort the pixel values in each blocks, and ... 详细信息
来源: 评论
The automorphism group of a shift of slow growth is amenable
收藏 引用
ERGODIC THEORY AND DYNAMICAL SYSTEMS 2020年 第7期40卷 1788-1804页
作者: Cyr, Van Kra, Bryna Bucknell Univ Lewisburg PA 17837 USA Northwestern Univ Evanston IL 60208 USA
Suppose. (X, sigma) is a subshift, P-X(n) is the word complexity function of X, and Aut(X) is the group of automorphisms of X. We show that if P-X(n) = o(n(2)/log(2) n), then Aut(X) is amenable (as a countable, discre... 详细信息
来源: 评论
High-fidelity reversible data hiding by Quadtree-based pixel value ordering
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2019年 第6期78卷 7125-7141页
作者: Di, Fuqiang Zhang, Minqing Liao, Xin Liu, Jia Engn Univ Chinese Peoples Armed Police Dept Elect Technol Xian 710086 Shaanxi Peoples R China Hunan Univ Coll Comp Sci & Elect Engn Changsha 410082 Hunan Peoples R China Hunan Police Acad Key Lab Network Crime Invest Hunan Prov Coll Changsha 410138 Hunan Peoples R China
Recently, the pixel value ordering (PVO) method has received a great deal of attention in the field of high-fidelity reversible data hiding. To improve the embedding performance of the PVO-based method, a quadtree-bas... 详细信息
来源: 评论
Counting generic measures for a subshift of linear growth
收藏 引用
JOURNAL OF THE EUROPEAN MATHEMATICAL SOCIETY 2019年 第2期21卷 355-380页
作者: Cyr, Van Kra, Bryna Bucknell Univ Lewisburg PA 17837 USA Northwestern Univ Evanston IL 60208 USA
In 1984 Boshernitzan proved an upper bound on the number of ergodic measures for a minimal subshift of linear block growth and asked if it could be lowered without further assumptions on the shift. We answer this ques... 详细信息
来源: 评论
Resource-Bounded Kolmogorov complexity Provides an Obstacle to Soficness of Multidimensional Shifts  36
Resource-Bounded Kolmogorov Complexity Provides an Obstacle ...
收藏 引用
36th International Symposium on Theoretical Aspects of Computer Science (STACS)
作者: Destombes, Julien Romashchenko, Andrei Univ Montpellier LIRMM Montpellier France Univ Montpellier CNRS LIRMM Montpellier France
We suggest necessary conditions of soficness of multidimensional shifts formulated in terms of resource-bounded Kolmogorov complexity. Using this technique we provide examples of effective and non-sofic shifts on Z(2)... 详细信息
来源: 评论