8   Artículos

 
en línea
Zhijun Wu, Rong Li, Panpan Yin and Changliang Li    
Steganalysis is used for preventing the illegal use of steganography to ensure the security of network communication through detecting whether or not secret information is hidden in the carrier. This paper presents an approach to detect the quantization ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hwai-Tsu Hu, Ying-Hsiang Lu     Pág. 18 - 32
This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partition... ver más
Revista: Advances in Technology Innovation    Formato: Electrónico

 
en línea
Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni and Hocine Cherifi    
Three-dimensional models have been extensively used in several applications including computer-aided design (CAD), video games, medical imaging due to the processing capability improvement of computers, and the development of network bandwidth. Therefore... ver más
Revista: Information    Formato: Electrónico

 
usuarios registrados
Chen, B; Wornell, G W     Pág. 1423 - 1443
Revista: IEEE TRANSACTIONS ON INFORMATION THEORY    Formato: Impreso

« Anterior     Página: 1 de 1     Siguiente »