咨询与建议

限定检索结果

文献类型

  • 67 篇 会议
  • 66 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 127 篇 工学
    • 90 篇 计算机科学与技术...
    • 70 篇 电气工程
    • 29 篇 软件工程
    • 24 篇 信息与通信工程
    • 14 篇 电子科学与技术(可...
    • 6 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 石油与天然气工程
    • 1 篇 生物医学工程(可授...
  • 19 篇 医学
    • 18 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 15 篇 理学
    • 10 篇 物理学
    • 3 篇 数学
    • 3 篇 系统科学
  • 9 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 美术学

主题

  • 134 篇 quantization ind...
  • 24 篇 watermarking
  • 19 篇 digital watermar...
  • 15 篇 steganography
  • 12 篇 dither modulatio...
  • 10 篇 data hiding
  • 9 篇 steganalysis
  • 9 篇 audio watermarki...
  • 9 篇 discrete wavelet...
  • 8 篇 discrete cosine ...
  • 6 篇 digital watermar...
  • 6 篇 singular value d...
  • 6 篇 robustness
  • 5 篇 robust watermark...
  • 4 篇 wavelet transfor...
  • 4 篇 information hidi...
  • 4 篇 blind image wate...
  • 4 篇 image watermarki...
  • 4 篇 entropy
  • 4 篇 distortion compe...

机构

  • 3 篇 natl ilan univ d...
  • 2 篇 univ michigan de...
  • 2 篇 univ southern ca...
  • 2 篇 kyushu inst tech...
  • 2 篇 univ putra malay...
  • 2 篇 amirkabir univ t...
  • 2 篇 october 6 univ f...
  • 2 篇 st marys jr coll...
  • 2 篇 middle e tech un...
  • 2 篇 chinese acad sci...
  • 2 篇 mckv inst engn d...
  • 2 篇 stevens inst tec...
  • 2 篇 guangdong univ t...
  • 2 篇 shenzhen univ co...
  • 1 篇 natl elect & com...
  • 1 篇 natl huaqiao uni...
  • 1 篇 usthb speech com...
  • 1 篇 yangzhou univ sc...
  • 1 篇 guangdong polyte...
  • 1 篇 natl polytech in...

作者

  • 6 篇 malik hafiz
  • 4 篇 subbalakshmi k. ...
  • 4 篇 chandramouli r.
  • 3 篇 nematollahi moha...
  • 3 篇 hsu ling-yuan
  • 3 篇 esen ersin
  • 3 篇 alatan a. aydin
  • 3 篇 li songbin
  • 3 篇 hu hwai-tsu
  • 2 篇 perez-gonzalez f...
  • 2 篇 al-haddad s. a. ...
  • 2 篇 rigoni ronaldo
  • 2 篇 dooms ann
  • 2 篇 farias mylene c....
  • 2 篇 zou fuhao
  • 2 篇 darazi rony
  • 2 篇 pérez-gonzález f
  • 2 篇 zhu xinshan
  • 2 篇 freitas pedro ga...
  • 2 篇 sadeghi fereshte...

语言

  • 129 篇 英文
  • 3 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=quantization index modulation"
134 条 记 录,以下是1-10 订阅
排序:
A generic collusion attack optimization strategy for traditional spread-spectrum and quantization index modulation fingerprinting
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2015年 第17期74卷 6967-6988页
作者: Feng, Hui Gan, Langxiong Ling, Hefei Zou, Fuhao Lu, Zhengding Wuhan Univ Technol Sch Transportat Key Lab High Performance Ship Technol Minist Educ Wuhan 430070 Hubei Peoples R China Wuhan Univ Technol Sch Nav Hubei Key Lab Inland Shipping Technol Wuhan 430070 Hubei Peoples R China Huazhong Univ Sci & Technol Coll Comp Sci Wuhan 430074 Hubei Peoples R China
Collusion attack is known to be a cost-effective attack against digital fingerprinting. Under the constraint that the fingerprint embedding algorithm and the host signal are unavailable to the adversaries, it is not v... 详细信息
来源: 评论
Audio watermarking based on quantization index modulation using combined perceptual masking
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2012年 第3期59卷 921-939页
作者: Singh, Jyotsna Garg, Parul De, Alok Nath Netaji Subhas Inst Technol Div Elect & Commun Engn New Delhi 110075 India ST Ericsson India SMIEEE Greater Noida 201308 UP India
In this paper, a robust audio watermarking scheme for MPEG-1/ Audio Layer II compressed domain is proposed. The scheme is implemented by modifying the subband coefficients using adaptive quantization index modulation.... 详细信息
来源: 评论
High-performance JPEG steganography using quantization index modulation in DCT domain
收藏 引用
PATTERN RECOGNITION LETTERS 2006年 第5期27卷 455-461页
作者: Noda, H Niimi, M Kawaguchi, E Kyushu Inst Technol Dept Syst Innovat & Informat Iizuka Fukuoka 8208502 Japan Keio Univ Minato Ku Tokyo 1088345 Japan
This paper presents two JPEG steganographic methods using quantization index modulation (QIM) in the discrete cosine transform (DCT) domain. The two methods approximately preserve the histogram of quantized DCT coeffi... 详细信息
来源: 评论
Steganalysis of joint codeword quantization index modulation steganography based on codeword Bayesian network
收藏 引用
NEUROCOMPUTING 2018年 313卷 316-323页
作者: Yang, Jie Li, Songbin Zhejiang A&F Univ Jiyang Coll Zhuji 311800 Peoples R China Shantou Univ Dept Comp Sci & Technol Shantou 515063 Peoples R China Chinese Acad Sci Haikou Lab Inst Acoust Haikou 570105 Hainan Peoples R China
quantization index modulation Steganography (QIMS) is an important category of steganography methods for low-bit-rate compressed speech. Early QIMS utilized independent codewords for embedding. Recently, new Joint Cod... 详细信息
来源: 评论
Robust information hiding in low-resolution videos with quantization index modulation in DCT-CS domain
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2018年 第14期77卷 18827-18847页
作者: Zhao, Huimin Dai, Qingyun Ren, J. C. Wei, Wenguo Xiao, Yinyin Li, Chunying Guangdong Polytech Normal Univ Sch Comp Sci Guangzhou Guangdong Peoples R China Guangzhou Key Lab Digital Content Proc & Secur Te Guangzhou Guangdong Peoples R China Guangdong Polytech Normal Univ Sch Elect & Informat Guangzhou Guangdong Peoples R China Univ Strathclyde Dept Elect & Elect Engn Glasgow Lanark Scotland
Video information hiding and transmission over noisy channels leads to errors on video and degradation of the visual quality notably. In this paper, a video signal fusion scheme is proposed to combine sensed host sign... 详细信息
来源: 评论
A blind audio watermarking technique based on a parametric quantization index modulation
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2018年 第19期77卷 25681-25708页
作者: Terchi, Younes Bouguezel, Saad Univ Ferhat Abbas Setif 1 Fac Technol Dept Elect Lab Croissance & Caracterisat Nouveaux Semicond Setif 19000 Algeria
In this paper, we propose an efficient transform-based blind audio watermarking technique by introducing a parametric quantization index modulation (QIM). Theoretical expressions for the signal to watermark ratio and ... 详细信息
来源: 评论
An Image Steganography Algorithm Based on quantization index modulation Resisting Scaling Attacks and Statistical Detection
收藏 引用
Computers, Materials & Continua 2018年 第7期56卷 151-167页
作者: Yue Zhang Dengpan Ye Junjun Gan Zhenyu Li Qingfeng Cheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Computer School of Wuhan University Wuhan 430072China Department of Computer Science University of YorkYork YO105GHUK
In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method,this pape... 详细信息
来源: 评论
Comparison of Forbidden Zone Data Hiding and quantization index modulation
收藏 引用
DIGITAL SIGNAL PROCESSING 2012年 第1期22卷 181-189页
作者: Esen, Ersin Alatan, A. Aydin ODTU TUBITAK UZAY TR-06531 Ankara Turkey METU Dept Elect & Elect Engn TR-06531 Ankara Turkey Rensselaer Polytech Inst Ctr Image Proc Res Troy NY USA New Jersey Inst Technol New Jersey Ctr Multimedia Res Newark NJ 07102 USA
Developing practical data hiding schemes that approach theoretical steganographic capacity limits is still a challenging research area. In this aspect, this problem is approached from a different perspective by propos... 详细信息
来源: 评论
Difference angle quantization index modulation scheme for image watermarking
收藏 引用
SIGNAL PROCESSING-IMAGE COMMUNICATION 2015年 34卷 52-60页
作者: Cai, Nian Zhu, Nannan Weng, Shaowei Ling, Bingo Wing-Kuen Guangdong Univ Technol Sch Informat Engn Guangzhou 510006 Guangdong Peoples R China
In this paper, we propose a new angle quantization index modulation (AQIM) method, called the difference AQIM (DAQIM) method. The proposed method aims to improve the watermarking performance against gain attacks. Unli... 详细信息
来源: 评论
A Blind, Semi-Fragile 3D mesh Watermarking Algorithm Using Minimum Distortion Angle quantization index modulation (3D-MDAQIM)
收藏 引用
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2019年 第4期44卷 3867-3882页
作者: Borah, Sagarika Borah, Bhogeswar Tezpur Univ Dept Comp Sci & Engn Tezpur India
This work proposes a semi-fragile, blind watermarking scheme in spatial domain to substantiate the authenticity of 3D models. The 3D mesh is first traversed with a topology-oriented strategy which also decides the ver... 详细信息
来源: 评论