咨询与建议

限定检索结果

文献类型

  • 67 篇 期刊文献
  • 67 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 135 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 127 篇 工学
    • 91 篇 计算机科学与技术...
    • 70 篇 电气工程
    • 30 篇 软件工程
    • 24 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 6 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 石油与天然气工程
    • 1 篇 生物医学工程(可授...
  • 19 篇 医学
    • 18 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 16 篇 理学
    • 11 篇 物理学
    • 3 篇 数学
    • 3 篇 系统科学
  • 9 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 美术学

主题

  • 135 篇 quantization ind...
  • 24 篇 watermarking
  • 20 篇 digital watermar...
  • 15 篇 steganography
  • 12 篇 dither modulatio...
  • 10 篇 data hiding
  • 9 篇 steganalysis
  • 9 篇 audio watermarki...
  • 9 篇 discrete wavelet...
  • 8 篇 discrete cosine ...
  • 6 篇 digital watermar...
  • 6 篇 singular value d...
  • 6 篇 robustness
  • 5 篇 robust watermark...
  • 4 篇 wavelet transfor...
  • 4 篇 information hidi...
  • 4 篇 blind image wate...
  • 4 篇 image watermarki...
  • 4 篇 entropy
  • 4 篇 distortion compe...

机构

  • 3 篇 natl ilan univ d...
  • 2 篇 univ michigan de...
  • 2 篇 univ southern ca...
  • 2 篇 kyushu inst tech...
  • 2 篇 univ putra malay...
  • 2 篇 amirkabir univ t...
  • 2 篇 october 6 univ f...
  • 2 篇 st marys jr coll...
  • 2 篇 middle e tech un...
  • 2 篇 chinese acad sci...
  • 2 篇 mckv inst engn d...
  • 2 篇 stevens inst tec...
  • 2 篇 guangdong univ t...
  • 2 篇 shenzhen univ co...
  • 1 篇 natl elect & com...
  • 1 篇 natl huaqiao uni...
  • 1 篇 usthb speech com...
  • 1 篇 yangzhou univ sc...
  • 1 篇 guangdong polyte...
  • 1 篇 natl polytech in...

作者

  • 6 篇 malik hafiz
  • 4 篇 subbalakshmi k. ...
  • 4 篇 chandramouli r.
  • 3 篇 nematollahi moha...
  • 3 篇 hsu ling-yuan
  • 3 篇 esen ersin
  • 3 篇 alatan a. aydin
  • 3 篇 li songbin
  • 3 篇 hu hwai-tsu
  • 2 篇 perez-gonzalez f...
  • 2 篇 al-haddad s. a. ...
  • 2 篇 rigoni ronaldo
  • 2 篇 dooms ann
  • 2 篇 farias mylene c....
  • 2 篇 zou fuhao
  • 2 篇 darazi rony
  • 2 篇 pérez-gonzález f
  • 2 篇 zhu xinshan
  • 2 篇 freitas pedro ga...
  • 2 篇 sadeghi fereshte...

语言

  • 129 篇 英文
  • 3 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=Quantization Index Modulation"
135 条 记 录,以下是51-60 订阅
排序:
Neighbor-index-division steganography based on QIM method for G.723.1 speech streams
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2016年 第1期7卷 139-147页
作者: Liu, Jin Tian, Hui Lu, Jing Chen, Yonghong Natl Huaqiao Univ Coll Comp Sci & Technol Xiamen 361021 Fujian Peoples R China Natl Huaqiao Univ Dept Informat Syst Xiamen 361021 Fujian Peoples R China
quantization index modulation (QIM) is a commonly used steganography method exploiting redundancy in codebook quantization procedure of signal encoding. The feasibility of steganography based on QIM depends on codeboo... 详细信息
来源: 评论
Joint-channel modeling to attack QIM steganography
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2016年 第21期75卷 13585-13611页
作者: Malik, Hafiz Subbalakshmi, K. P. Chandramouli, R. Univ Michigan Elect & Comp Engn Dept Dearborn MI 48128 USA Stevens Inst Technol Elect & Comp Engn Dept Hoboken NJ 07030 USA
This paper presents a statistical steganalysis framework to attack quantization index modulation (QIM) based steganography. The quantization process is generally modeled as an additive noise channel. The proposed meth... 详细信息
来源: 评论
Labelling bins for lattice quantization index modulation
Labelling bins for lattice quantization index modulation
收藏 引用
Conference on Optics, Photonics, and Digital Technologies for Multimedia Applications
作者: Bardyn, Dieter Dooms, Ann Munteanu, Adrian Schelkens, Peter Vrije Univ Brussel Interdisciplinary Inst Broadband Technol IBBT Brussels Belgium
In this paper, the effect of binary labelling bins for lattice quantization index modulation techniques is studied. The problem can be solved in one dimension using Gray codes but it is not straightforward for higher ... 详细信息
来源: 评论
DC-QIM based image watermarking method via the contourlet transform
收藏 引用
JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2016年 第3期16卷 459-468页
作者: Chao, Zhou Civil Aviat Flight Univ China CAAC Acad Flight Technol & Safety Guanghan 618307 Sichuan Peoples R China
In recent years, many works on digital image watermarking have been proposed all aiming at protection of the copyright of an image document or authentication of data. In this paper, to serve the purpose of copyright p... 详细信息
来源: 评论
Improved quantization index modulation Based Watermarking Integrated to JPEG2000 Coding Scheme
Improved Quantization Index Modulation Based Watermarking In...
收藏 引用
Conference on Visual Information Processing and Communication
作者: Zaid, Azza Ouled Makhloufi, Achraf Olivier, Christian Tunisian Natl Engn Sch SysCom Lab BP 37 Belvedere Tunis 1002 Tunisia Poitiers Univ UMR CNRS 6172 SIC Dept XLIMSP2MI F-86962 Futuroscope France
In recent years it has been recognized that embedding information in wavelet transform domain leads to more robust watermarks. In particular, several approaches have been proposed to address the problem of watermark e... 详细信息
来源: 评论
ECG Steganography Using Contourlet Transform For Transmission of Secured Patient Identity  1
ECG Steganography Using Contourlet Transform For Transmissio...
收藏 引用
1st Singapore-Cybersecurity R and D Conference (SG-CRC)
作者: Sam Jeeva Raj, Edward Jero Ramu, Palaniappan Indian Inst Technol Madras Dept Engn Design Madras Tamil Nadu India
ECG steganography hides patient data inside their ECG signal to ensure the protection of patient's identity. In this work, an attempt has been made to evaluate ECG Steganography where quantization index modulation... 详细信息
来源: 评论
Schur Decomposition Based Robust Watermarking Algorithm in Contourlet Domain  2nd
Schur Decomposition Based Robust Watermarking Algorithm in C...
收藏 引用
2nd International Conference on Cloud Computing and Security (ICCCS)
作者: Wang, Junxiang Liu, Ying Jingdezhen Ceram Inst Sch Mech & Elect Engn Jiangxi 333403 Peoples R China Nanjing Univ Informat Sci & Technol Sch Comp & Software Jiangsu 210000 Peoples R China
Most of the existing watermarking schemes utilized SVD decomposition to embed watermark, which lead to a high computational complexity and incidental the false positive detection problem. Therefore, this paper provide... 详细信息
来源: 评论
Semi-fragile digital speech watermarking for online speaker recognition
收藏 引用
EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING 2015年 第1期2015卷 1页
作者: Nematollahi, Mohammad Ali Akhaee, Mohammad Ali Al-Haddad, S. A. R. Gamboa-Rosales, Hamurabi Univ Putra Malaysia Fac Engn Dept Comp & Commun Syst Engn Upm Serdang 43400 Selangor Darul Malaysia Univ Tehran Coll Engn Dept Elect & Comp Engn Tehran Iran Autonomous Univ Zacatecas Fac Elect Engn Zacatecas Mexico
In this paper, a semi-fragile and blind digital speech watermarking technique for online speaker recognition systems based on the discrete wavelet packet transform (DWPT) and quantization index modulation (QIM) has be... 详细信息
来源: 评论
Wavelet-based high-capacity watermarking of 3-D irregular meshes
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2015年 第15期74卷 5897-5915页
作者: Zaid, A. Ouled Hachani, M. Puech, W. Univ Tunis El Manar Natl Engn Sch Tunis SysCom Lab Tunis 1002 Tunisia CNRS UMR 5506 LIRMM Lab F-34095 Montpellier 5 France
Digital watermarking can be used as data hiding technique to interleave cover content with auxiliary information before transmitting and storing applications. While image and video watermarking has been widely studied... 详细信息
来源: 评论
Discrete Multiwavelet-Based Video Watermarking Scheme Using SURF
收藏 引用
ETRI JOURNAL 2015年 第3期37卷 595-605页
作者: Narkedamilly, Leelavathy Evani, Venkateswara Prasad Samayamantula, Srinivas Kumar Jawaharlal Nehru Technol Univ Dept Comp Sci & Engn Kakinada Andhra Pradesh India Jawaharlal Nehru Technol Univ Dept Elect & Commun Engn Kakinada Andhra Pradesh India
This paper proposes a robust, imperceptible block-based digital video watermarking algorithm that makes use of the Speeded Up Robust Feature (SURF) technique. The SURF technique is used to extract the most important f... 详细信息
来源: 评论