咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 5 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 信息与通信工程

主题

  • 6 篇 steganography al...
  • 3 篇 data hiding
  • 2 篇 reversible color...
  • 2 篇 mosaic image
  • 2 篇 secret fragment ...
  • 1 篇 data retrieval.
  • 1 篇 irreversible dat...
  • 1 篇 wav audio
  • 1 篇 zernike moment
  • 1 篇 adaptive multi-r...
  • 1 篇 magic matrix sch...
  • 1 篇 compressed audio
  • 1 篇 secret key
  • 1 篇 statistic detect...
  • 1 篇 scaling attack
  • 1 篇 image processing

机构

  • 1 篇 national laborat...
  • 1 篇 institute for in...
  • 1 篇 faculty of compu...
  • 1 篇 department of co...
  • 1 篇 govt coll engn a...
  • 1 篇 univ shanghai sc...
  • 1 篇 dalian univ tech...
  • 1 篇 natl chung hsing...
  • 1 篇 college of infor...
  • 1 篇 state key lab ma...
  • 1 篇 school of inform...
  • 1 篇 chaoyang univ te...

作者

  • 1 篇 chatur p. n.
  • 1 篇 liu fenlin
  • 1 篇 deepali g. singh...
  • 1 篇 luo xiangyang
  • 1 篇 su kaile
  • 1 篇 rosziati ibrahim
  • 1 篇 singhavi deepali...
  • 1 篇 teoh suk kuan
  • 1 篇 lee chin-feng
  • 1 篇 xu yanyan
  • 1 篇 shen jau-ji
  • 1 篇 ke dengfeng
  • 1 篇 agrawal somya
  • 1 篇 zhang yue
  • 1 篇 ruan ye
  • 1 篇 guo yanqing
  • 1 篇 qin chuan
  • 1 篇 p. n. chatur
  • 1 篇 li yen-hsi

语言

  • 6 篇 英文
检索条件"主题词=steganography algorithm"
6 条 记 录,以下是1-10 订阅
排序:
steganography algorithm for adaptive multi-rate wideband speech based on algebraic codebook search
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2018年 第3期25卷 71-79页
作者: Ruan Ye Xu Yanyan Ke Dengfeng Su Kaile School of Information Science and Technology Beijing Forestry University National Laboratory of Pattern Recognition Institute of AutomationChinese Academy of Sciences Institute for Integrated and Intelligent Systems Griffith University College of Information Science and Technology Jinan University
With the popularity of adaptive multi-rate wideband (AMR-WB) audio in mobile communication, many AMR- WB based techniques, such as a similar compression architecture to transmit secret information during the process... 详细信息
来源: 评论
steganography algorithm to Hide Secret Message inside an Image
收藏 引用
Computer Technology and Application 2011年 第2期2卷 102-108页
作者: Rosziati Ibrahim Teoh Suk Kuan Faculty of Computer Science and Information Technology University Tun Hussein Onn Malaysia (UTHM) Batu Pahat 86400Johor Malaysia
In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is con... 详细信息
来源: 评论
Zernike Moment-Based Spatial Image steganography Resisting Scaling Attack and Statistic Detection
收藏 引用
IEEE ACCESS 2019年 7卷 24282-24289页
作者: Zhang, Yue Luo, Xiangyang Guo, Yanqing Qin, Chuan Liu, Fenlin State Key Lab Math Engn & Adv Comp Zhengzhou 450000 Henan Peoples R China Dalian Univ Technol Sch Informat & Commun Engn Dalian 116024 Peoples R China Univ Shanghai Sci & Technol Sch Opt Elect & Comp Engn Shanghai 200093 Peoples R China
The mainstream adaptive steganography algorithm is difficult to resist scaling attack, and the anti-detection performance of the algorithm based on quantization index modulation is not high enough. To solve the above ... 详细信息
来源: 评论
A New Method for Creation of Secret-Fragment-Visible-Mosaic Image for Secure Communication  2
A New Method for Creation of Secret-Fragment-Visible-Mosaic ...
收藏 引用
2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
作者: Singhavi, Deepali G. Chatur, P. N. Govt Coll Engn Amravati Dept Comp Sci & Engn Amravati India
In recent years as many of our daily tasks are related to internet the security of information being transmitted over the internet is an important issue. Many applications or fields require transmitting secret image o... 详细信息
来源: 评论
Image Steganographic Scheme Based on Double-layer Magic Matrix  10
Image Steganographic Scheme Based on Double-layer Magic Matr...
收藏 引用
IEEE 10th International Conference on Awareness Science and Technology (iCAST)
作者: Shen, Jau-Ji Lee, Chin-Feng Li, Yen-Hsi Agrawal, Somya Natl Chung Hsing Univ Dept Management Informat Syst Taichung Taiwan Chaoyang Univ Technol Dept Informat Management Taichung Taiwan
Data hiding is a technique used for embedding secret messages in a carrier medium which cannot be perceived by human eye. In the data hiding scheme based on the magic matrix, previous methods exploited a magic matrix ... 详细信息
来源: 评论
A New Method for Creation of Secret-Fragment-Visible-Mosaic Image for Secure Communication
A New Method for Creation of Secret-Fragment-Visible-Mosaic ...
收藏 引用
International Conference on Innovations in Information, Embedded and Communication Systems
作者: Deepali G. Singhavi P. N. Chatur Department of Computer Science and Engineering Government College of Engineering
In recent years as many of our daily tasks are related to internet the security of information being transmitted over the internet is an important issue. Many applications or fields require transmitting secret image o... 详细信息
来源: 评论