نتایج جستجو برای: low order bits embedding
تعداد نتایج: 2071507 فیلتر نتایج به سال:
Cluster indexing-based steganography is an important branch of data-hiding techniques. Such schemes normally achieve good balance between high embedding capacity and low embedding distortion. However, most cluster indexing-based steganographic schemes utilise less efficient clustering algorithms for embedding data, which causes redundancy and leaves room for increasing the embedding capacity fu...
Due to the technological advances and the speed of the Internet, people are concerned that their personal information that might be stolen by hackers. In today’s society, many data hiding algorithms and steganographic algorithms have been introduced to protect valuable information. Unfortunately, many strong steganography analysis tools have been provided to unauthorized users in order for them...
In this paper new general modewise Johnson--Lindenstrauss (JL) subspace embeddings are proposed that can be both generated much faster and stored more easily than traditional JL when working with extremely large vectors and/or tensors. Corresponding embedding results then proven for two different types of low-dimensional (tensor) subspaces. The first these produces improved space complexity bou...
Embedding method has become a popular way to handle unstructured data, such as word and text. Word embedding, providing computational-friendly representations for word similarity, is almost be one of the standard solutions for various text mining tasks. Lots of recent studies focusing on word embedding try to generate a more comprehensive representation for each word that incorporating task-spe...
In this paper we survey different steganography techniques for encrypting the data along with characteristics, difference with cryptography. Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or e...
Since the Internet is a medium for transporting sensitive data, privacy of message transported has become major concern. Image steganography prominent tool hiding data to ensure during transfer. An efficient system essential accomplish best embedding capacity and maintain other parameters at satisfying level. encryption systems provide secure flexible image conversion storage in transmission sy...
In today’s digital world securing different forms of content is very important in terms of protecting copyright and verifying authenticity. One example is watermarking of digital audio and images. We believe that a marking scheme analogous to digital watermarking but for documents is very important. In this paper we describe the use of laser amplitude modulation in electrophotographic printers ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید