咨询与建议

限定检索结果

文献类型

  • 67 篇 期刊文献
  • 67 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 135 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 127 篇 工学
    • 91 篇 计算机科学与技术...
    • 70 篇 电气工程
    • 30 篇 软件工程
    • 24 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 6 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 石油与天然气工程
    • 1 篇 生物医学工程(可授...
  • 19 篇 医学
    • 18 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 16 篇 理学
    • 11 篇 物理学
    • 3 篇 数学
    • 3 篇 系统科学
  • 9 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 美术学

主题

  • 135 篇 quantization ind...
  • 24 篇 watermarking
  • 20 篇 digital watermar...
  • 15 篇 steganography
  • 12 篇 dither modulatio...
  • 10 篇 data hiding
  • 9 篇 steganalysis
  • 9 篇 audio watermarki...
  • 9 篇 discrete wavelet...
  • 8 篇 discrete cosine ...
  • 6 篇 digital watermar...
  • 6 篇 singular value d...
  • 6 篇 robustness
  • 5 篇 robust watermark...
  • 4 篇 wavelet transfor...
  • 4 篇 information hidi...
  • 4 篇 blind image wate...
  • 4 篇 image watermarki...
  • 4 篇 entropy
  • 4 篇 distortion compe...

机构

  • 3 篇 natl ilan univ d...
  • 2 篇 univ michigan de...
  • 2 篇 univ southern ca...
  • 2 篇 kyushu inst tech...
  • 2 篇 univ putra malay...
  • 2 篇 amirkabir univ t...
  • 2 篇 october 6 univ f...
  • 2 篇 st marys jr coll...
  • 2 篇 middle e tech un...
  • 2 篇 chinese acad sci...
  • 2 篇 mckv inst engn d...
  • 2 篇 stevens inst tec...
  • 2 篇 guangdong univ t...
  • 2 篇 shenzhen univ co...
  • 1 篇 natl elect & com...
  • 1 篇 natl huaqiao uni...
  • 1 篇 usthb speech com...
  • 1 篇 yangzhou univ sc...
  • 1 篇 guangdong polyte...
  • 1 篇 natl polytech in...

作者

  • 6 篇 malik hafiz
  • 4 篇 subbalakshmi k. ...
  • 4 篇 chandramouli r.
  • 3 篇 nematollahi moha...
  • 3 篇 hsu ling-yuan
  • 3 篇 esen ersin
  • 3 篇 alatan a. aydin
  • 3 篇 li songbin
  • 3 篇 hu hwai-tsu
  • 2 篇 perez-gonzalez f...
  • 2 篇 al-haddad s. a. ...
  • 2 篇 rigoni ronaldo
  • 2 篇 dooms ann
  • 2 篇 farias mylene c....
  • 2 篇 zou fuhao
  • 2 篇 darazi rony
  • 2 篇 pérez-gonzález f
  • 2 篇 zhu xinshan
  • 2 篇 freitas pedro ga...
  • 2 篇 sadeghi fereshte...

语言

  • 129 篇 英文
  • 3 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=Quantization Index Modulation"
135 条 记 录,以下是91-100 订阅
排序:
Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images
收藏 引用
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION 2012年 第3期23卷 454-466页
作者: Phadikar, Amit Maity, Santi P. Mandal, Mrinal Univ Alberta Dept Elect & Comp Engn Edmonton AB T6G 2V4 Canada MCKV Inst Engn Dept Informat Technol Liluah 711204 Howrah India Bengal Engn & Sci Univ Dept Informat Technol Sibpur 711103 Howrah India
This paper proposes a tamper detection and correction technique using semi-fragile data hiding that aims to achieve high perceptual quality of images at the user-end even after malicious modifications. A binary signat... 详细信息
来源: 评论
Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2012年 第2期7卷 418-431页
作者: Malik, Hafiz Subbalakshmi, K. P. Chandramouli, R. Univ Michigan Dept Elect & Comp Engn Dearborn MI 48128 USA Stevens Inst Technol Dept Elect & Comp Engn Hoboken NJ 07030 USA
This paper proposes an active steganalysis method for quantization index modulation (QIM)-based steganography. The proposed nonparametric steganalysis method uses irregularity (or randomness) in the test image to dist... 详细信息
来源: 评论
An Adaptive Medical Images Watermarking Using Quantum Particle Swarm Optimization
An Adaptive Medical Images Watermarking Using Quantum Partic...
收藏 引用
35th International Conference on Telecommunications and Signal Processing (TSP)
作者: Soliman, Mona M. Hassanien, Aboul Ella Onsi, Hoda M. Cairo Univ Fac Comp & Informat Cairo Egypt
In this paper, we present a novel application of Quantum Particle Swarm Optimization (QPSO) in the field of medical image watermarking for copyright protection and authentication. The trade-off between the imperceptib... 详细信息
来源: 评论
A method for resisting averaging attacks on digital watermarks and use of this method with digital watermarks
A method for resisting averaging attacks on digital watermar...
收藏 引用
2012 15th International Conference on Network-Based Information Systems, NBIS 2012
作者: Nishikawa, Hiroki Kuse, Shingo Iwamura, Keiichi Echizen, Isao Tokyo University of Science TUS Tokyo Japan National Institute of Informatics NII Tokyo Japan
A method is proposed for resisting averaging attacks, in which many users collude to make an average image in which the watermarked information is canceled out. This method works by minutely and uniquely changing the ... 详细信息
来源: 评论
AUDIO WATERMARKING BASED ON quantization index modulation IN THE FREQUENCY DOMAIN
AUDIO WATERMARKING BASED ON QUANTIZATION INDEX MODULATION IN...
收藏 引用
IEEE International Conference on Signal Processing and Communications
作者: Khademi, Nima Akhaee, Mohammad A. Ahadi, Seyed Mohammad Moradi, Maziar Kashi, Amir Amirkabir Univ Technol Tehran Iran Sharif Univ Technol Tehran Iran
In this paper, our main purpose is to embed data in the frequency domain of audio signals. Data was embedded by means of quantization index modulation (QIM) in the frequency domain. With this aim, the spectrum of the ... 详细信息
来源: 评论
Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 2011年 第8期21卷 1130-1138页
作者: Esen, Ersin Alatan, A. Aydin Middle E Tech Univ TUBITAK UZAY Space Technol Res Inst TR-06531 Ankara Turkey Middle E Tech Univ Dept Elect & Elect Engn TR-06531 Ankara Turkey
Video data hiding is still an important research topic due to the design complexities involved. We propose a new video data hiding method that makes use of erasure correction capability of repeat accumulate codes and ... 详细信息
来源: 评论
A COMPARATIVE ANALYSIS OF BIOMETRIC SECRET-KEY BINDING SCHEMES BASED ON QIM AND WYNER-ZIV CODING
A COMPARATIVE ANALYSIS OF BIOMETRIC SECRET-KEY BINDING SCHEM...
收藏 引用
IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Talwai, Aniketh Bui, Francis M. Khisti, Ashish Hatzinakos, Dimitrios Indian Inst Technol Guwahati Dept Elect & Commun Engn Gauhati 781039 India Univ Toronto Dept Elect & Comp Engn Toronto ON M5S 3G4 Canada
Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, quantization index modulation (QIM) andWyner-Ziv (... 详细信息
来源: 评论
High-performance JPEG steganography using quantization index modulation in DCT domain
收藏 引用
PATTERN RECOGNITION LETTERS 2006年 第5期27卷 455-461页
作者: Noda, H Niimi, M Kawaguchi, E Kyushu Inst Technol Dept Syst Innovat & Informat Iizuka Fukuoka 8208502 Japan Keio Univ Minato Ku Tokyo 1088345 Japan
This paper presents two JPEG steganographic methods using quantization index modulation (QIM) in the discrete cosine transform (DCT) domain. The two methods approximately preserve the histogram of quantized DCT coeffi... 详细信息
来源: 评论
Modified spread-transform dither modulation
Modified spread-transform dither modulation
收藏 引用
2011年无线通信与信号处理国际会议(WCSP 2011)
作者: YifengZhang ChengweiJia ZhengkangXu Kai Wang Wenjiang Pei School of Information Science and Engineering SoutheastUniversity Nanjing 210096 China
According to the correlation between adjacent blocks of the carrier image, two algorithms, called STDM-COMW and STDM-PCO-MW, are proposed. By using the quantization step calculated from the previous secondary block t... 详细信息
来源: 评论
Block-Based Watermarking for Color Images Using Visibility of quantization Noise
收藏 引用
INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY 2010年 第2期20卷 179-189页
作者: Liu, Kuo-Cheng Taiwan Hospitality & Tourism Coll Informat Educating Ctr Hualien Taiwan Taiwan Hospitality & Tourism Coll Dept Leisure Management Hualien Taiwan
Color images are believed to be more ideal for watermark embedding than grayscale images, because color images provide more space for hiding data. Robustness and transparency of the embedded watermark are required by ... 详细信息
来源: 评论