咨询与建议

限定检索结果

文献类型

  • 67 篇 期刊文献
  • 67 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 135 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 127 篇 工学
    • 91 篇 计算机科学与技术...
    • 70 篇 电气工程
    • 30 篇 软件工程
    • 24 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 6 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 石油与天然气工程
    • 1 篇 生物医学工程(可授...
  • 19 篇 医学
    • 18 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 16 篇 理学
    • 11 篇 物理学
    • 3 篇 数学
    • 3 篇 系统科学
  • 9 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 美术学

主题

  • 135 篇 quantization ind...
  • 24 篇 watermarking
  • 20 篇 digital watermar...
  • 15 篇 steganography
  • 12 篇 dither modulatio...
  • 10 篇 data hiding
  • 9 篇 steganalysis
  • 9 篇 audio watermarki...
  • 9 篇 discrete wavelet...
  • 8 篇 discrete cosine ...
  • 6 篇 digital watermar...
  • 6 篇 singular value d...
  • 6 篇 robustness
  • 5 篇 robust watermark...
  • 4 篇 wavelet transfor...
  • 4 篇 information hidi...
  • 4 篇 blind image wate...
  • 4 篇 image watermarki...
  • 4 篇 entropy
  • 4 篇 distortion compe...

机构

  • 3 篇 natl ilan univ d...
  • 2 篇 univ michigan de...
  • 2 篇 univ southern ca...
  • 2 篇 kyushu inst tech...
  • 2 篇 univ putra malay...
  • 2 篇 amirkabir univ t...
  • 2 篇 october 6 univ f...
  • 2 篇 st marys jr coll...
  • 2 篇 middle e tech un...
  • 2 篇 chinese acad sci...
  • 2 篇 mckv inst engn d...
  • 2 篇 stevens inst tec...
  • 2 篇 guangdong univ t...
  • 2 篇 shenzhen univ co...
  • 1 篇 natl elect & com...
  • 1 篇 natl huaqiao uni...
  • 1 篇 usthb speech com...
  • 1 篇 yangzhou univ sc...
  • 1 篇 guangdong polyte...
  • 1 篇 natl polytech in...

作者

  • 6 篇 malik hafiz
  • 4 篇 subbalakshmi k. ...
  • 4 篇 chandramouli r.
  • 3 篇 nematollahi moha...
  • 3 篇 hsu ling-yuan
  • 3 篇 esen ersin
  • 3 篇 alatan a. aydin
  • 3 篇 li songbin
  • 3 篇 hu hwai-tsu
  • 2 篇 perez-gonzalez f...
  • 2 篇 al-haddad s. a. ...
  • 2 篇 rigoni ronaldo
  • 2 篇 dooms ann
  • 2 篇 farias mylene c....
  • 2 篇 zou fuhao
  • 2 篇 darazi rony
  • 2 篇 pérez-gonzález f
  • 2 篇 zhu xinshan
  • 2 篇 freitas pedro ga...
  • 2 篇 sadeghi fereshte...

语言

  • 128 篇 英文
  • 3 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=Quantization Index Modulation"
135 条 记 录,以下是101-110 订阅
排序:
An improved QIM based anti-collusion fingerprinting scheme
An improved QIM based anti-collusion fingerprinting scheme
收藏 引用
IEEE 10th International Conference on Signal Processing
作者: Cheng, Geping Ling, Hefei Zou, Fuhao Li, Ping Huazhong Univ Sci & Technol Sch Comp Sci & Technol Wuhan 430074 Hubei Peoples R China
Digital fingerprinting is a technique by embedding a unique identifying signal which corresponds to the user's identity in each legally distributed copy. A digital fingerprinting system may suffer from, the collus... 详细信息
来源: 评论
STATISTICAL MODELING OF FOOTPRINTS OF QIM STEGANOGRAPHY
STATISTICAL MODELING OF FOOTPRINTS OF QIM STEGANOGRAPHY
收藏 引用
International Conference on Multimedia and Expo
作者: Malik, Hafiz Univ Michigan Informat Syst Secur & Forens Lab Dept Elect & Comp Engn Dearborn MI 48128 USA
In this paper, a new model is proposed to characterize distortion due to message embedding. The proposed statistical model is used to develop a parametric steganalysis technique to attack quantization index modulation... 详细信息
来源: 评论
Image Watermarking Algorithms with Synchronization mechanism using Self-synchronization decoding and Feature Points
Image Watermarking Algorithms with Synchronization mechanism...
收藏 引用
7th IEEE Electronics, Robotics and Automotive Mechanics Conference (CERMA)
作者: Takahara, Keita Yamaguchi, Kazuhiko Nakano-Miyatake, Mariko Perez-Meana, Hector Univ Electrocommun Dept Informat Commun Engn Chofu Tokyo Japan Natl Polytech Inst ESIME Culhuacan Postgrad & Res Sect Mexico City DF Mexico
In this paper we propose two image watermarking algorithms, which are robust to cropping operation using self-synchronization mechanism. In both algorithms, the watermark sequence is firstly encoded by non-cyclic Low ... 详细信息
来源: 评论
quantization BASED DATA HIDING STRATEGIES WITH VISUAL APPLICATIONS
QUANTIZATION BASED DATA HIDING STRATEGIES WITH VISUAL APPLIC...
收藏 引用
作者: ERSİN ESEN Middle East Technical University
学位级别:博士
The first explored area in this thesis is the proposed data hiding method, TCQ-IS. The method is based on Trellis Coded quantization (TCQ), whose initial state selection is arbitrary. TCQ-IS exploits this fact to hide... 详细信息
来源: 评论
Multibit QIM Watermarking Using M-ary modulation and Lifting
Multibit QIM Watermarking Using M-ary Modulation and Lifting
收藏 引用
International Conference on Signal Processing and Communications
作者: Phadikar, Amit Maity, Santi P. MCKV Inst Engn Dept Informat Technol Liluah 711204 Howrah India Bengal Engn & Sci Univ Dept Informat Technol Howrah 711103 India
quantization index modulation (QIM) principle has shown superior performance in digital watermarking over spread-spectrum and low-bit(s) modulation based methods. In QIM based data hiding scheme, it is a challenging t... 详细信息
来源: 评论
Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks
Comparative Study of Wavelet Based Lattice QIM Techniques an...
收藏 引用
8th International Workshop on Digital Watermarking
作者: Bardyn, Dieter Dooms, Ann Dams, Tim Schelkens, Peter VUB Interdisciplinary Inst Broadband Technol IBBT Dept Elect & Informat ETRO B-1050 Brussels Belgium
We study watermarking techniques based on quantization index modulation for which sets of lattice quantizers Q(m) are used (LQIM). A recipe for constructing such quantizers Q(m) is proposed, where the size of these se... 详细信息
来源: 评论
QIM-DM WATERMARKING OPTIMIZATION BASED ON INTER-FREQUENCY CONTRAST MASKING IN THE DCT DOMAIN
QIM-DM WATERMARKING OPTIMIZATION BASED ON INTER-FREQUENCY CO...
收藏 引用
1st IEEE International Workshop on Information Forensics and Security
作者: Battisti, Federica Carli, Marco Neri, Alessandro Univ Roma TRE Dept Appl Elect I-00146 Rome Italy
In this paper a watermarking scheme based on the Human Visual System (HVS) is presented. A quantization index modulation - Dither modulation scheme is used in the Discrete Cosine Transform domain for the embedding. Th... 详细信息
来源: 评论
SECURE AND HVS-ADAPTIVE EXHIBITION SPREAD TRANSFORM DITHER modulation WATERMARKING FOR DIGITAL CINEMA
SECURE AND HVS-ADAPTIVE EXHIBITION SPREAD TRANSFORM DITHER M...
收藏 引用
1st IEEE International Workshop on Information Forensics and Security
作者: Darazi, Rony Callau, Pilar Macq, Benoit Catholic Univ Louvain Commun & Remote Sensing Lab B-1348 Louvain Belgium
In this paper, we propose a secure watermarking scheme based on Spread Transform Dither modulation (STDM) method for Digital Cinema. The embedding is performed in the JPEG2000 decoding pipeline after the de-quantizati... 详细信息
来源: 评论
A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization
收藏 引用
5th International Conference on Information Security Practice and Experience
作者: Zhu, Shaomin Liu, Jianming China Elect Power Res Inst Beijing 100192 Peoples R China State Grid Informat & Teclecomm Co Ltd Beijing 100761 Peoples R China
In this paper, we proposed a novel watermarking scheme based on adaptive quantization index modulation and singular value decomposition in the hybrid discrete wavelet transform (DWT) and discrete cosine transform (DCT... 详细信息
来源: 评论
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2008年 第4期3卷 593-610页
作者: Perez-Freire, Luis Perez-Gonzalez, Fernando Univ Vigo ETSI Telecommun Signal Theory & Commun Dept Vigo 36310 Spain
This paper presents a security analysis for data-hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The security is quantified as the difficulty... 详细信息
来源: 评论