咨询与建议

限定检索结果

文献类型

  • 24 篇 期刊文献
  • 24 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 50 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 44 篇 工学
    • 27 篇 计算机科学与技术...
    • 17 篇 电气工程
    • 11 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 软件工程
    • 3 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
  • 8 篇 理学
    • 4 篇 数学
    • 3 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 5 篇 医学
    • 5 篇 临床医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 50 篇 matrix encoding
  • 10 篇 steganography
  • 6 篇 data hiding
  • 5 篇 steganalysis
  • 4 篇 image steganogra...
  • 4 篇 genetic algorith...
  • 3 篇 information hidi...
  • 3 篇 lsb matching
  • 3 篇 video steganogra...
  • 2 篇 wavelet absolute...
  • 2 篇 single digit sum
  • 2 篇 embedding effici...
  • 2 篇 modification rat...
  • 2 篇 skype
  • 2 篇 pairing function
  • 2 篇 community detect...
  • 2 篇 chaotic neural n...
  • 2 篇 hamming encoding
  • 2 篇 reversible data ...
  • 2 篇 image coding

机构

  • 2 篇 shanghai univ sc...
  • 2 篇 charles universi...
  • 2 篇 natl dong hwa un...
  • 2 篇 tsinghua univ de...
  • 1 篇 kiit univ sch co...
  • 1 篇 qingdao technol ...
  • 1 篇 new jersey inst ...
  • 1 篇 hangzhou dianzi ...
  • 1 篇 natl huaqiao uni...
  • 1 篇 ict res inst it ...
  • 1 篇 cv raman coll en...
  • 1 篇 civil aviat univ...
  • 1 篇 anyang univ dept...
  • 1 篇 changchun univ s...
  • 1 篇 jingdezhen ceram...
  • 1 篇 beijing jiaotong...
  • 1 篇 jimei univ comp ...
  • 1 篇 nanfang coll gua...
  • 1 篇 guangzhou univ s...
  • 1 篇 civil aviat univ...

作者

  • 4 篇 yang ching-nung
  • 4 篇 kim cheonshik
  • 2 篇 huang yongfeng
  • 2 篇 hrinčárová monik...
  • 2 篇 das mamatarani
  • 2 篇 zhang weiming
  • 2 篇 shin dongkyoo
  • 2 篇 dash shreela
  • 1 篇 sifuentes ronnie...
  • 1 篇 ding hongchang
  • 1 篇 pun chi-man
  • 1 篇 huang jiwu
  • 1 篇 wu song-yu
  • 1 篇 deng nianmao
  • 1 篇 lei min
  • 1 篇 tian hui
  • 1 篇 zhang chenlei
  • 1 篇 jiang peng
  • 1 篇 ma qiaomei liu s...
  • 1 篇 wang shuozhong

语言

  • 46 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"主题词=matrix encoding"
50 条 记 录,以下是1-10 订阅
排序:
matrix encoding for data hiding using multilayer video coding and transcoding solutions
收藏 引用
SIGNAL PROCESSING-IMAGE COMMUNICATION 2012年 第9期27卷 1025-1034页
作者: Shanableh, Tamer Amer Univ Sharjah Dept Comp Sci & Engn Sharjah U Arab Emirates
This paper proposes a multitier data hiding solution in MPEG video using matrix encoding. In the first tier of the proposed solution, raw video is encoded into two layers using multilayer Signal to Noise Ratio (SNR) e... 详细信息
来源: 评论
matrix encoding-based high-capacity and high-fidelity reversible data hiding in HEVC
收藏 引用
SIGNAL IMAGE AND VIDEO PROCESSING 2020年 第5期14卷 897-905页
作者: Konyar, Mehmet Zeki Akbulut, Orhan Ozturk, Sitki Kocaeli Univ Informat Syst Engn Dept Umuttepe Campus TR-41001 Kocaeli Turkey Kocaeli Univ Comp Engn Dept Umuttepe Campus TR-41001 Kocaeli Turkey Kocaeli Univ Elect & Telecommun Engn Dept Umuttepe Campus TR-41001 Kocaeli Turkey
Nowadays, data hiding has become important for different reasons such as copyright violation and authentication. Conventional data hiding approaches may suffer from high capacity and high fidelity. In general, increas... 详细信息
来源: 评论
A compact covering method to exploit embedding capacity for matrix encoding
收藏 引用
INFORMATION SCIENCES 2012年 188卷 170-181页
作者: Lin, Ren-Der Chang, Chao-Tsun Hsiuping Univ Sci & Technol Dept Informat Management Taichung Taiwan
Recently, a number of covering schemes proposed to exploit embedding capacity in covering images using matrix encoding. When binary secret data include a high frequency of repeated bit-blocks, a preprocessing phase is... 详细信息
来源: 评论
Stego key recovery method for F5 steganography with matrix encoding
收藏 引用
EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING 2020年 第1期2020卷 1-17页
作者: Liu, Jiufen Yang, Chunfang Wang, Junchao Shi, Yanan Zhengzhou Sci & Technol Inst Sci Ave Zhengzhou 450001 Peoples R China State Key Lab Math Engn & Adv Comp Sci Ave Zhengzhou 450001 Peoples R China
When embedding secret message into image by steganography with matrix encoding, there are still no effective methods to recover the stego key because it is difficult to statistically distinguish the stego coefficient ... 详细信息
来源: 评论
A High-Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and matrix encoding for Non-Volatile Memory-Based Cloud Service
收藏 引用
IEEE ACCESS 2020年 8卷 52028-52040页
作者: Xie, Xiao-Zhu Chang, Chin-Chen Chen, Kaimeng Xiamen Univ Technol Dept Informat Engn & Comp Sci Xiamen 361024 Peoples R China Feng Chia Univ Dept Informat Engn & Comp Sci Taichung 40724 Taiwan Engn Res Ctr Software Testing & Evaluat Fujian Pr Xiamen 361024 Peoples R China Hangzhou Dianzi Univ Sch Comp Sci & Technol Hangzhou 310018 Peoples R China Jimei Univ Comp Engn Coll Xiamen 361021 Peoples R China
With the rise of non-volatile memory used in cloud service, it becomes urgent to reduce the write cost so as to improve the data manipulation capability. This paper proposed a high embedding efficiency reversible data... 详细信息
来源: 评论
An AMBTC Authentication Scheme With Recoverability Using matrix encoding and Side Match
收藏 引用
IEEE ACCESS 2021年 9卷 133746-133761页
作者: Hong, Wien Wu, Jie Lou, Der-Chyuan Zhou, Xiaoyu Chen, Jeanne Natl Taichung Univ Sci & Technol Dept Comp Sci & Informat Engn Taichung 404 Taiwan Nanfang Coll Guangzhou Sch Elect & Comp Engn Guangzhou 501970 Guangdong Peoples R China Chang Gung Univ Dept Comp Sci & Informat Engn Taoyuan 333 Taiwan Linkou Chang Gung Mem Hosp Dept Neurol Stroke Ctr Taoyuan 333 Taiwan Jimei Univ Sch Informat Engn Xiamen 361021 Fujian Peoples R China
This paper presents an authentication scheme with recoverability based on Absolute moment block truncation coding (AMBTC). Previous works do not take into account characteristics of the AMBTC compressed codes. Therefo... 详细信息
来源: 评论
A Study on Embedding Efficiency of matrix encoding
收藏 引用
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS 2012年 第1期4卷 37-48页
作者: Yu, Lifang Shi, Yun Q. Zhao, Yao Ni, Rongrong Cao, Gang Beijing Jiaotong Univ Biomed Engn Beijing Peoples R China New Jersey Inst Technol Dept Elect & Comp Engn Newark NJ 07102 USA Beijing Jiaotong Univ Inst Informat Sci Beijing Peoples R China
In this paper, the authors examine embedding efficiency, which influences the most concerned performance of steganography, security, directly. Embedding efficiency is defined as the number of random message bits embed... 详细信息
来源: 评论
Improved Genetic Algorithm Based on Operation Order matrix encoding for Job Shop Scheduling Problem
Improved Genetic Algorithm Based on Operation Order Matrix E...
收藏 引用
2nd International Conference on Manufacturing Science and Engineering
作者: Zhan, Hong Yang, Jianjun Ju, Luyan Qingdao Technol Univ Sch Mech Engn Qingdao 266033 Peoples R China
This paper presents an improved genetic algorithm for the job shop scheduling problem. We designed a new encoding method based on operation order matrix, a matrix correspond to a chromosome, the value of elements is n... 详细信息
来源: 评论
A Novel Steganography Algorithm Based on Motion Vector and matrix encoding
A Novel Steganography Algorithm Based on Motion Vector and M...
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and Networks(2011第三届通信软件与网络国际会议 ICCSN2011)
作者: HAO-BIN ZHAO LI-YI ZHONG Wei-Dong Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an710086Chin Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086Chi
The modification of most traditional steganography algorithms based on motion vector is relatively high. After analyzing these steganography algorithms, we propose a novel steganography algorithm. The information ... 详细信息
来源: 评论
A Novel Steganography Algorithm Based on Motion Vector and matrix encoding
A Novel Steganography Algorithm Based on Motion Vector and M...
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and Networks(ICCSN 2011)
作者: HAO-BIN Key Laboratory of Network& Information Security of APF, Engineering College of APF,Xi’an 710086,China ZHAO LI-YI Key Laboratory of Network& Information Security of APF, Engineering College of APF,Xi’an 710086,China ZHONG Wei-Dong Key Laboratory of Network& Information Security of APF, Engineering College of APF,Xi’an 710086,China
The modification of most traditional steganography algorithms based on motion vector is relatively *** analyzing these steganography algorithms,we propose a novel steganography *** information is embedded into the opt... 详细信息
来源: 评论