نتایج جستجو برای: embedding method

تعداد نتایج: 1686665  

2012
Kazuki Minemura KokSheik Wong

Many watermark algorithms were proposed for protecting digital media from unauthorized use. Visible watermark scheme indicates the copyright of a digital media by embedding an inconspicuous but recognizable pattern into the media. However, the embedding process often results in serious distortion in the protected content, and the embedding process is not reversible. This paper proposes a revers...

2015
K. SRIRAM N. PRIYA

Combining the Syndrome-Trellis Codes (STC) proposed recently, a new steganography method for JPEG images is presented in this paper. The method improves embedding efficiency by using the STC, and then preserves the DCT coefficient histogram statistic feature by constraining the proportion that are used for information embedding among the coefficients with the absolute value equal to one. Experi...

Journal: :IEICE Transactions 2010
Naoki Takayama Kota Matsushita Shogo Ito Ning Li Keigo Bunsen Kenichi Okada Akira Matsuzawa

This paper proposes a de-embedding method for on-chip S-parameter measurements at mm-wave frequency. The proposed method uses only two transmission lines with different length. In the proposed method, a parasitic-component model extracted from two transmission lines can be used for de-embedding for other-type DUTs like transistor, capacitor, inductor, etc. The experimental results show that the...

2006
Guoqiang Wang Zongying Ou Fan Ou Dianting Liu Feng Han

Neighborhood Preserving Embedding (NPE) is a subspace learning algorithm. Since NPE is a linear approximation to Locally Linear Embedding (LLE) algorithm, it has good neighborhood-preserving properties. Although NPE has been applied in many fields, it has limitations to solve recognition task. In this paper, a novel subspace method, named Kernel Fisher Neighborhood Preserving Embedding (KFNPE),...

2000
Yeuan-Kuen Lee Ling-Hwei Chen

Steganography is an ancient art of conveying messages in a secret way that only the receiver knows the existence of message. So, a fundamental requirement for a steganographic method is imperceptibility; this means that the embedded messages should not be discernible to the human eye. There are two other requirements, one is to maximize the embedding capacity, and the other is security. The lea...

2012
Vladimír BÁNOCI Gabriel BUGÁR Dušan LEVICKÝ Zita KLENOVIČOVÁ

In this paper, we present a novel steganographic method for embedding of a secret data in still grayscale JPEG image. In order to provide large capacity of pro– posed method while maintaining good visual quality of stego-image, the embedding process is performed in quan– tized transform coefficients of Discrete Cosine transform (DCT) by modifying coefficients according to modulo function, what ...

Journal: :CoRR 2015
Greg Mori Caroline Pantofaru Nisarg Kothari Thomas Leung George Toderici Alexander Toshev Weilong Yang

We present a method for learning an embedding that places images of humans in similar poses nearby. This embedding can be used as a direct method of comparing images based on human pose, avoiding potential challenges of estimating body joint positions. Pose embedding learning is formulated under a triplet-based distance criterion. A deep architecture is used to allow learning of a representatio...

Journal: :Wireless Sensor Network 2009
Hedieh Sajedi Mansour Jamzad

A category of techniques for secret data communication called steganography hides data in multimedia mediums. It involves embedding secret data into a cover-medium by means of small perceptible and statistical degradation. In this paper, a new adaptive steganography method based on contourlet transform is presented that provides large embedding capacity. We called the proposed method ContSteg. ...

2015
CHI-YUAN LIN JYUN-JIE WANG

A matrix embedding code was developed as a commonly used steganographic technique in which a parity-check matrix is used to perform embedding. However, a drawback of high decoding complexity for linear block codes by using the maximum-likelihood algorithm is unrealistic. This paper proposes a simple and effective trellis embedding scheme for binary messages. Compared with a matrix embedding alg...

2016
Shuochao Yao Shiqi Zhou

Embedding method has become a popular way to handle unstructured data, such as word and text. Word embedding, providing computational-friendly representations for word similarity, is almost be one of the standard solutions for various text mining tasks. Lots of recent studies focusing on word embedding try to generate a more comprehensive representation for each word that incorporating task-spe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید