咨询与建议

限定检索结果

文献类型

  • 24 篇 期刊文献
  • 24 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 50 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 44 篇 工学
    • 27 篇 计算机科学与技术...
    • 17 篇 电气工程
    • 11 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 软件工程
    • 3 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
  • 8 篇 理学
    • 4 篇 数学
    • 3 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 5 篇 医学
    • 5 篇 临床医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 50 篇 matrix encoding
  • 10 篇 steganography
  • 6 篇 data hiding
  • 5 篇 steganalysis
  • 4 篇 image steganogra...
  • 4 篇 genetic algorith...
  • 3 篇 information hidi...
  • 3 篇 lsb matching
  • 3 篇 video steganogra...
  • 2 篇 wavelet absolute...
  • 2 篇 single digit sum
  • 2 篇 embedding effici...
  • 2 篇 modification rat...
  • 2 篇 skype
  • 2 篇 pairing function
  • 2 篇 community detect...
  • 2 篇 chaotic neural n...
  • 2 篇 hamming encoding
  • 2 篇 reversible data ...
  • 2 篇 image coding

机构

  • 2 篇 shanghai univ sc...
  • 2 篇 charles universi...
  • 2 篇 natl dong hwa un...
  • 2 篇 tsinghua univ de...
  • 1 篇 kiit univ sch co...
  • 1 篇 qingdao technol ...
  • 1 篇 new jersey inst ...
  • 1 篇 hangzhou dianzi ...
  • 1 篇 natl huaqiao uni...
  • 1 篇 ict res inst it ...
  • 1 篇 cv raman coll en...
  • 1 篇 civil aviat univ...
  • 1 篇 anyang univ dept...
  • 1 篇 changchun univ s...
  • 1 篇 jingdezhen ceram...
  • 1 篇 beijing jiaotong...
  • 1 篇 jimei univ comp ...
  • 1 篇 nanfang coll gua...
  • 1 篇 guangzhou univ s...
  • 1 篇 civil aviat univ...

作者

  • 4 篇 yang ching-nung
  • 4 篇 kim cheonshik
  • 2 篇 huang yongfeng
  • 2 篇 hrinčárová monik...
  • 2 篇 das mamatarani
  • 2 篇 zhang weiming
  • 2 篇 shin dongkyoo
  • 2 篇 dash shreela
  • 1 篇 sifuentes ronnie...
  • 1 篇 ding hongchang
  • 1 篇 pun chi-man
  • 1 篇 huang jiwu
  • 1 篇 wu song-yu
  • 1 篇 deng nianmao
  • 1 篇 lei min
  • 1 篇 tian hui
  • 1 篇 zhang chenlei
  • 1 篇 jiang peng
  • 1 篇 ma qiaomei liu s...
  • 1 篇 wang shuozhong

语言

  • 46 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"主题词=Matrix Encoding"
50 条 记 录,以下是11-20 订阅
排序:
A genetic algorithm for community detection in complex networks
收藏 引用
Journal of Central South University 2013年 第5期20卷 1269-1276页
作者: 李赟 刘钢 老松杨 College of Information System and Management National University of Defense Technology
A new genetic algorithm for community detection in complex networks was proposed. It adopts matrix encoding that enables traditional crossover between individuals. Initial populations are generated using nodes similar... 详细信息
来源: 评论
A coding problem in steganography
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2008年 第1期46卷 67-81页
作者: Zhang, Weiming Li, Shiqu Informat Engn Univ Dept Informat Res Zhengzhou 450002 Peoples R China Shanghai Univ Sch Commun & Informat Engn Shanghai 200076 Peoples R China
To study how to design a steganographic algorithm more efficiently, a new coding problem-steganographic codes (abbreviated stego-codes)-is presented in this paper. The stego-codes are defined over the field with q(q &... 详细信息
来源: 评论
Data hiding based on overlapped pixels using hamming code
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2016年 第23期75卷 15651-15663页
作者: Kim, Cheonshik Yang, Ching-Nung Anyang Univ Digital Media Engn 708-113 Anyang 5 Dong Anyang 430714 Kyonggi Do South Korea Natl Dong Hwa Univ Dept Comp Sci & Informat Engn Hualien 9701 Taiwan
Most data hiding schemes change the least significant bits to conceal messages in the cover images. matrix encoding scheme is a well known scheme in this field. The matrix encoding proposed by Crandall can be used in ... 详细信息
来源: 评论
Improving capacity of Hamming (n, k)+1 stego-code by using optimized Hamming plus k
收藏 引用
DIGITAL SIGNAL PROCESSING 2018年 78卷 284-293页
作者: Kim, Cheonshik Shin, Dongkyoo Yang, Ching-Nung Chou, Yung-Shun Sejong Univ Dept Comp Engn 209 Neungdong Ro Seoul South Korea Natl Dong Hwa Univ Dept Comp Sci & Informat Engn 1Sec 2Da Hsueh Rd Hualien 97401 Taiwan
The Hamming coding (n,k) + 1 data hiding (H1DH) scheme is based on matrix encoding and has the characteristic of a good embedding efficiency. This scheme improves the embedding efficiency of Hamming coding (n,k) data ... 详细信息
来源: 评论
Improved adaptive partial-matching steganography for Voice over IP
收藏 引用
COMPUTER COMMUNICATIONS 2015年 第Oct.1期70卷 95-108页
作者: Tian, Hui Qin, Jie Guo, Shuting Huang, Yongfeng Liu, Jin Wang, Tian Chen, Yonghong Cai, Yiqiao Natl Huaqiao Univ Coll Comp Sci & Technol Xiamen 361021 Peoples R China Tsinghua Univ Dept Elect Engn Beijing 100084 Peoples R China
In Voice over IP scenarios, adaptive partial-matching steganography (APMS) is an effective approach to balance steganographic transparency and bandwidth, in which the strategies involved, however, have not achieved th... 详细信息
来源: 评论
LMDGW: a novel matrix based dynamic graph watermark
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2019年 第1期10卷 295-304页
作者: Zeng, Lingling Ren, Wei Chen, Yuling Lei, Min China Univ Geosci Sch Comp Sci Wuhan Hubei Peoples R China Guizhou Univ Guizhou Prov Key Lab Publ Big Data Guiyang Guizhou Peoples R China Beijing Univ Posts & Telecommun Informat Secur Ctr Beijing Peoples R China
Android platform induces an open application development framework to attract more developers and promote larger market occupations. However, the open architecture also makes it easier to reverse engineering, which re... 详细信息
来源: 评论
Improving embedding efficiency of covering codes for applications in steganography
收藏 引用
IEEE COMMUNICATIONS LETTERS 2007年 第8期11卷 680-682页
作者: Zhang, Weiming Wang, Shuozhong Zhang, Xinpeng Shanghai Univ Sch Commun & Informat Engn Shanghai 200076 Peoples R China Informat Engn Inst Dept Informat Res Zhengzhou 450002 Peoples R China
In image steganography, each pixel can carry a ternary message by choosing adding/subtracting one to/from the gray value. Although ternary covering functions can provide embedding efficiency higher than binary ones, i... 详细信息
来源: 评论
A Multi-Objective Emergency Rescue Facilities Location Model for Catastrophic Interlocking Chemical Accidents in Chemical Parks
收藏 引用
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2020年 第11期21卷 4749-4761页
作者: Men, Jinkun Jiang, Peng Zheng, Song Kong, Yaguang Zhao, Ye Sheng, Gang Su, Nan Zheng, Sulu Hangzhou Dianzi Univ Sch Automat Hangzhou 310000 Peoples R China Quzhou Special Equipment Inspect Ctr Quzhou 324000 Peoples R China Zhejiang Transit Fluorine Silicon Quzhou 324000 Peoples R China Hangzhou Xihu Dist Affordable Housing Management Hangzhou 310000 Peoples R China
Catastrophic interlocking chemical accidents (CICAs) are the most frequent hazardous events that occur in chemical parks, and they result in severe human casualties and property losses. Emergency rescue facilities pla... 详细信息
来源: 评论
Research on information security in text emotional steganography based on machine learning
收藏 引用
ENTERPRISE INFORMATION SYSTEMS 2021年 第7期15卷 984-1001页
作者: Li, Fufang Tang, Han Zou, Yukang Huang, Yongfeng Feng, Yuanyong Peng, Lingxi Guangzhou Univ Sch Comp Sci & Cyber Engn Guangzhou 510006 Peoples R China Jilin Univ Coll Commun Engn Changchun Peoples R China Tsinghua Univ Dept Elect Engn Beijing Peoples R China Guangzhou Univ Sch Mech & Elect Engn Guangzhou Peoples R China
To effectively protect sensitive information, this paper proposes a method of text Emotional modulation steganography based on machine learning. Firstly, we explore an intelligent dynamic expansion method for text emo... 详细信息
来源: 评论
A novel image steganography scheme based on morphological associative memory and permutation schema
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2015年 第2期8卷 110-121页
作者: Nazari, Sara Eftekhari-Moghadam, Amir-Masoud Moin, Mohammad-Shahram Islamic Azad Univ Qazvin Branch Fac Comp & Informat Technol Engn Qazvin Iran ICT Res Inst IT Fac Tehran Iran
Steganography is the art and science of hiding a message in a carrier, in such a manner that no one, except the sender and intended recipient, can guess the existence of the message;it is a form of security through ob... 详细信息
来源: 评论