咨询与建议

限定检索结果

文献类型

  • 67 篇 期刊文献
  • 67 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 135 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 127 篇 工学
    • 91 篇 计算机科学与技术...
    • 70 篇 电气工程
    • 30 篇 软件工程
    • 24 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 6 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 石油与天然气工程
    • 1 篇 生物医学工程(可授...
  • 19 篇 医学
    • 18 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 16 篇 理学
    • 11 篇 物理学
    • 3 篇 数学
    • 3 篇 系统科学
  • 9 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 美术学

主题

  • 135 篇 quantization ind...
  • 24 篇 watermarking
  • 20 篇 digital watermar...
  • 15 篇 steganography
  • 12 篇 dither modulatio...
  • 10 篇 data hiding
  • 9 篇 steganalysis
  • 9 篇 audio watermarki...
  • 9 篇 discrete wavelet...
  • 8 篇 discrete cosine ...
  • 6 篇 digital watermar...
  • 6 篇 singular value d...
  • 6 篇 robustness
  • 5 篇 robust watermark...
  • 4 篇 wavelet transfor...
  • 4 篇 information hidi...
  • 4 篇 blind image wate...
  • 4 篇 image watermarki...
  • 4 篇 entropy
  • 4 篇 distortion compe...

机构

  • 3 篇 natl ilan univ d...
  • 2 篇 univ michigan de...
  • 2 篇 univ southern ca...
  • 2 篇 kyushu inst tech...
  • 2 篇 univ putra malay...
  • 2 篇 amirkabir univ t...
  • 2 篇 october 6 univ f...
  • 2 篇 st marys jr coll...
  • 2 篇 middle e tech un...
  • 2 篇 chinese acad sci...
  • 2 篇 mckv inst engn d...
  • 2 篇 stevens inst tec...
  • 2 篇 guangdong univ t...
  • 2 篇 shenzhen univ co...
  • 1 篇 natl elect & com...
  • 1 篇 natl huaqiao uni...
  • 1 篇 usthb speech com...
  • 1 篇 yangzhou univ sc...
  • 1 篇 guangdong polyte...
  • 1 篇 natl polytech in...

作者

  • 6 篇 malik hafiz
  • 4 篇 subbalakshmi k. ...
  • 4 篇 chandramouli r.
  • 3 篇 nematollahi moha...
  • 3 篇 hsu ling-yuan
  • 3 篇 esen ersin
  • 3 篇 alatan a. aydin
  • 3 篇 li songbin
  • 3 篇 hu hwai-tsu
  • 2 篇 perez-gonzalez f...
  • 2 篇 al-haddad s. a. ...
  • 2 篇 rigoni ronaldo
  • 2 篇 dooms ann
  • 2 篇 farias mylene c....
  • 2 篇 zou fuhao
  • 2 篇 darazi rony
  • 2 篇 pérez-gonzález f
  • 2 篇 zhu xinshan
  • 2 篇 freitas pedro ga...
  • 2 篇 sadeghi fereshte...

语言

  • 129 篇 英文
  • 3 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=Quantization Index Modulation"
135 条 记 录,以下是81-90 订阅
排序:
AUGMENTING REMOTE MULTIMODAL PERSON VERIFICATION BY EMBEDDING VOICE CHARACTERISTICS INTO FACE IMAGES
AUGMENTING REMOTE MULTIMODAL PERSON VERIFICATION BY EMBEDDIN...
收藏 引用
IEEE International Conference on Multimedia and Expo Workshops (ICMEW)
作者: Wang, Su Hu, Roland Yu, Huimin Zheng, Xia Damper, R. I. Zhejiang Univ Dept Informat Sci & Elect Engn Hangzhou 310027 Peoples R China Zhejiang Univ Dept Culture Heritage & Museol Hangzhou 310027 Peoples R China Univ Southampton Dept Elect & Comp Sci Southampton SO17 1BJ Hants England
This paper presents a biometric watermarking algorithm to augment remote multimodal recognition by embedding voice characteristics into face images. We embed both a fragile watermark for tampering detection, as well a... 详细信息
来源: 评论
Digital watermarking algorithm research of color images based on quaternion Fourier Transform
Digital watermarking algorithm research of color images base...
收藏 引用
8th Symposium on Multispectral Image Processing and Pattern Recognition (MIPPR) - Multispectral Image Acquisition, Processing, and Analysis
作者: An, Mali Wang, Weijiang Zhao, Zhen Beijing Inst Technol Beijing 100081 Peoples R China
A watermarking algorithm of color images based on the quaternion Fourier Transform (QFFT) and improved quantization index algorithm (QIM) is proposed in this paper. The original image is transformed by QFFT, the water... 详细信息
来源: 评论
A High-rate Chaotic Secured Covert Channel based on Multiple Embedding in Images
A High-rate Chaotic Secured Covert Channel based on Multiple...
收藏 引用
8th International Conference on Computer Engineering and Systems (ICCES)
作者: Seleym, Ashraf October 6 Univ Fac Engn Dept Elect Commun Engn Cairo Egypt
Covert channel is a type of secure communications that provides reliable security in transferring information between entities. quantization index modulation (QIM) technique can be used to embed data in images to impl... 详细信息
来源: 评论
SCALABLE AUDIO CODING USING WATERMARKING
SCALABLE AUDIO CODING USING WATERMARKING
收藏 引用
IEEE International Conference on Multimedia and Expo Workshops (ICMEW)
作者: Movassagh, Mahmood Kabal, Peter McGill Univ Dept Elect & Comp Engn Montreal PQ Canada
A scalable audio coding method is proposed using a technique, quantization index modulation, borrowed from watermarking. Some of the information of each layer output is embedded (watermarked) in the previous layer. Th... 详细信息
来源: 评论
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors
Use of Linear Error-Correcting Subcodes in Flow Watermarking...
收藏 引用
14th IFIP-TC 6 and TC-11 International Conference on Communications and Multimedia Security (CMS)
作者: Assanovich, Boris Puech, William Tkachenko, Iuliia YK State Univ Grodno BELARUS Univ Montpellier 2 CNRS LIRMM UMR 5506 F-34095 Montpellier 5 France Authenticat Ind Montpellier France
An invisible flow watermarking QIM scheme based on linear error-correcting subcodes for channels with substitution and deletion errors is proposed in this paper. The evaluation of scheme demonstrates similar to known ... 详细信息
来源: 评论
Real-time video watermarking system on the compressed domain for high-definition video contents: Practical issues
收藏 引用
DIGITAL SIGNAL PROCESSING 2012年 第1期22卷 190-198页
作者: Lee, Min-Jeong Im, Dong-Hyuck Lee, Hae-Yeoun Kim, Kyung-Su Lee, Heung-Kyu Korea Adv Inst Sci & Technol Dept Elect Engn & Comp Sci Taejon 305701 South Korea Kumoh Natl Inst Technol Sch Comp & Software Engn Gumi Gyeongbuk South Korea Cornell Univ Weill Med College Ithaca NY 14853 USA
Everyday, we encounter high-quality multimedia contents from HDTV broadcasting, DVD, and high-speed Internet services. These contents are, unhappily, processed and distributed without protection. This paper proposes a... 详细信息
来源: 评论
A Hybrid Approach of DWT and DCT for Rational Dither modulation Watermarking
收藏 引用
CIRCUITS SYSTEMS AND SIGNAL PROCESSING 2012年 第2期31卷 797-811页
作者: Liu, Jinhua She, Kun Univ Elect Sci & Technol China Sch Engn & Comp Sci Chengdu 611731 Peoples R China
In this paper, on the basis of the theories and methods of Watson's perceptual model and rational dither modulation (RDM), a hybrid quantization-based watermarking in the discrete wavelet transform (DWT) and discr... 详细信息
来源: 评论
A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition
收藏 引用
SIGNAL PROCESSING 2012年 第9期92卷 1985-2001页
作者: Lei, Baiying Soon, Ing Yann Zhou, Feng Li, Zhen Lei, Haijun Nanyang Technol Univ Sch Elect & Elect Engn Singapore 639798 Singapore Georgia Inst Technol George W Woodruff Sch Mech Engn Atlanta GA 30332 USA Shenzhen Univ Coll Comp Sci & Technol Shenzhen Peoples R China
In this paper, a new and robust audio watermarking scheme based on lifting wavelet transform (LWT) and singular value decomposition (SVD) is proposed. Specifically, the watermark data is efficiently inserted in the co... 详细信息
来源: 评论
A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images
收藏 引用
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2012年 第1期106卷 47-54页
作者: Bouslimi, Dalel Coatrieux, Gouenou Roux, Christian Telecom Bretagne Dept Image & Traitement Informat F-29238 Brest France INSERM U650 Lab Traitement Informat Med F-29238 Brest France
In this paper we propose a joint encryption/watermarking algorithm for the purpose of protecting medical images. The proposed solution gives access to the outcomes of the image integrity and of its origins as its atta... 详细信息
来源: 评论
Performance analysis and improvement of dither modulation under the composite attacks
收藏 引用
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING 2012年 第1期2012卷 1-19页
作者: Zhu, Xinshan Ding, Jie Yangzhou Univ Sch Informat Engn Yangzhou 225009 Peoples R China State Key Lab Digital Publishing Technol Beijing 100871 Peoples R China Beihang Univ State Key Lab Software Dev Environm Beijing 100191 Peoples R China
The first goal of this article is to analyze the performance of dither modulation (DM) against the composite attacks including valumetric scaling, additive noise and constant change. The analyzes are developed under t... 详细信息
来源: 评论