咨询与建议

限定检索结果

文献类型

  • 12 篇 会议
  • 11 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 16 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 8 篇 信息与通信工程
    • 3 篇 电子科学与技术(可...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
    • 1 篇 软件工程
  • 2 篇 理学
    • 2 篇 物理学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...

主题

  • 24 篇 embedding algori...
  • 3 篇 multipath routin...
  • 3 篇 image steganogra...
  • 3 篇 failure probabil...
  • 3 篇 virtual optical ...
  • 3 篇 data center
  • 3 篇 survivability
  • 3 篇 perturbation
  • 3 篇 virtualization
  • 3 篇 network virtuali...
  • 3 篇 elastic optical ...
  • 2 篇 information hidi...
  • 2 篇 image watermarki...
  • 2 篇 arnold transform
  • 2 篇 virtual network
  • 2 篇 extraction algor...
  • 2 篇 copyright protec...
  • 1 篇 skills
  • 1 篇 cycle pattern ge...
  • 1 篇 representation l...

机构

  • 2 篇 china elect powe...
  • 2 篇 beijing univ pos...
  • 1 篇 china electric p...
  • 1 篇 northeastern uni...
  • 1 篇 northeastern uni...
  • 1 篇 northeastern uni...
  • 1 篇 chinese acad sci...
  • 1 篇 shanghai jiao to...
  • 1 篇 department of in...
  • 1 篇 state key labora...
  • 1 篇 aaa coll engn de...
  • 1 篇 tzu chi univ dep...
  • 1 篇 univ malaysia pa...
  • 1 篇 china univ techn...
  • 1 篇 natl dong hwa un...
  • 1 篇 shanghai jiao to...
  • 1 篇 department of el...
  • 1 篇 northeastern uni...
  • 1 篇 univ sci & techn...
  • 1 篇 najran univ coll...

作者

  • 3 篇 wang cong
  • 3 篇 yuan ying
  • 2 篇 wang cuirong
  • 2 篇 hu weisheng
  • 2 篇 zhao yongli
  • 2 篇 zhou jing
  • 2 篇 yan fangfang
  • 2 篇 zhang jie
  • 2 篇 lee tony t.
  • 2 篇 ding huixia
  • 2 篇 luo guangjun
  • 2 篇 zhu na
  • 1 篇 bowen chen
  • 1 篇 rinita roy
  • 1 篇 hindi ayman tahe...
  • 1 篇 phong nguyen tua...
  • 1 篇 chang chien-ping
  • 1 篇 thanh ta minh
  • 1 篇 dhobale harshada
  • 1 篇 vigneshkumar v.

语言

  • 24 篇 英文
检索条件"主题词=embedding algorithm"
24 条 记 录,以下是11-20 订阅
Random Pixel embedding: A Novel Approach to Image Steganography  2
Random Pixel Embedding: A Novel Approach to Image Steganogra...
收藏 引用
2nd IEEE World Conference on Communication and Computing (WCONF)
作者: Kanjalkar, Jyoti Talele, Ajay Kanjalkar, Pramod Dhobale, Harshada Gavali, Shrushti Pimple, Akhilesh Waghmare, Nikita Vishwakarma Inst Technol Pune Maharashtra India
This project presents a novel approach to image steganography titled "Random Pixel embedding: A Novel Approach to Image Steganography." Steganography, the art of concealing information within an innocuous ca... 详细信息
来源: 评论
Nodes Clustering and Dynamic Service Balance Awareness Based Virtual Network embedding
Nodes Clustering and Dynamic Service Balance Awareness Based...
收藏 引用
IEEE International Conference of Region 10 (TENCON)
作者: Xue, Jiao You, Jiali Wang, Jinlin Deng, Feng Chinese Acad Sci Inst Acoust Natl Network New Media Engn Res Ctr Beijing Peoples R China
Network virtualization is an important technique to allow multiple customized networks to cohabit on a shared substrate network. In order to put the network virtualization into practice, the virtual network embedding ... 详细信息
来源: 评论
SURVIVABLE VIRTUAL OPTICAL NETWORK embedding WITH PROBABILISTIC NETWORK-ELEMENT FAILURES IN ELASTIC OPTICAL NETWORKS  13
SURVIVABLE VIRTUAL OPTICAL NETWORK EMBEDDING WITH PROBABILIS...
收藏 引用
13th International Conference on Optical Communications and Networks (IEEE ICOCN)
作者: Luo, Guangjun Ding, Huixia Zhou, Jing Zhang, Jie Zhao, Yongli Chen, Bowen Ma, Chen Beijing Univ Posts & Telecommun State Key Lab Informat Photon & Opt Commun Beijing 100876 Peoples R China China Elect Power Res Inst Beijing 100192 Peoples R China
To measure the survivability of virtual optical network embedding, a novel metric named virtual optical network failure probability (VON-FP) is presented in elastic optical networks. We then develop a failure-probabil... 详细信息
来源: 评论
A Novel Method for Virtual Network embedding with Incentive Convergence Mechanism  3
A Novel Method for Virtual Network Embedding with Incentive ...
收藏 引用
3rd International Conference on Advanced Cloud and Big Data (CBD)
作者: Wang, Cong Liu, Guohua Yuan, Ying Northeastern Univ Qinhuangdao Sch Comp & Commun Engn Qinhuangdao Peoples R China Donghua Univ Dept Comp Software & Theory Shanghai Peoples R China Northeastern Univ Qinhuangdao Ctr Comp Qinhuangdao Peoples R China
One of the main challenges of network virtualization is efficient mapping of virtual nodes and virtual links onto the substrate network resources, which is known as virtual network embedding (VNE) problem. This paper ... 详细信息
来源: 评论
A new block selection strategy from LU decomposition domain for robust image watermarking
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2024年 第7期83卷 19301-19325页
作者: Thi, Nha Phuong Minh, Thanh Ta Le Quy Don Univ 236 Hoang Quoc Viet Hanoi Vietnam
The piracy of digital products has become an urgent problem to be solved. Robust watermarking is a promising technique for copyright protection. To go against rapidly increasing attacks, many techniques have been prop... 详细信息
来源: 评论
Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data
收藏 引用
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING 2022年 第2期33卷 561-578页
作者: Almawgani, A. H. M. Alhawari, Adam R. H. Hindi, Ayman Taher Al-Arashi, Waled Hussein Al-Ashwal, A. Y. Najran Univ Coll Engn Elect Engn Dept Najran Saudi Arabia Univ Sci & Technol Fac Engn Dept Elect Engn Sanaa Yemen
Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the tradeoff between managing high capacity of secret data and ensuring hig... 详细信息
来源: 评论
The Improving of Spread Spectrum Video Digital Watermarking algorithm
The Improving of Spread Spectrum Video Digital Watermarking ...
收藏 引用
Conference on the Future Computer and Control Systems
作者: Lin, Shiwei Zhai, Yuwen Jilin Inst Chem Technol Coll Informat & Control Engn Jilin Jilin Peoples R China Jiangxi Univ Mech Elect Engn Coll Jian Jiangxi Peoples R China
Digital watermarking technology is that directly embedded a number of landmark information into the multimedia content through a certain algorithm, which does not affect the value and use of original content, and can ... 详细信息
来源: 评论
Image Steganography algorithm based on Huffman Encoding and Transform Domain Method  5
Image Steganography Algorithm based on Huffman Encoding and ...
收藏 引用
5th International Conference on Advanced Computing (ICoAC)
作者: Vijay, M. VigneshKumar, V. AAA Coll Engn Dept ECE Sivakasi India AAA Coll Engn Dept EEE Sivakasi India
Steganography is the art and science of writing hidden messages in such a way that, apart from the sender and intended recipient, no one suspects the existence of the message, a form of security through the state of b... 详细信息
来源: 评论
SURVIVABLE VIRTUAL OPTICAL NETWORK embedding WITH PROBABILISTIC NETWORK-ELEMENT FAILURES IN ELASTIC OPTICAL NETWORKS
SURVIVABLE VIRTUAL OPTICAL NETWORK EMBEDDING WITH PROBABILIS...
收藏 引用
The 13th International Conference on Optical Communications and Networks, ICOCN 2014(2014第13届光通信与网络国际会议)
作者: Guangjun Luo Chen Ma Bowen Chen Yongli Zhao Jie Zhang Jing Zhou Huixia Ding State Key Laboratory of Information Photonics and Optical Communication Beijing University of Posts China Electric Power Research Institute Beijing100192China
To measure the survivability of virtual optical network embedding,a novel metric named virtual optical network failure probability(VON-FP)is presented in elastic optical *** then develop a failure-probabilityaware vir... 详细信息
来源: 评论
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-500
收藏 引用
2016年
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-500 by published by
来源: 评论