標(biāo)題: Titlebook: Recent Advances in Information Hiding and Applications; Jeng-Shyang Pan,Hsiang-Cheh Huang,Yao Zhao Book 2013 Springer-Verlag Berlin Heidel [打印本頁] 作者: incompatible 時間: 2025-3-21 18:23
書目名稱Recent Advances in Information Hiding and Applications影響因子(影響力)
書目名稱Recent Advances in Information Hiding and Applications影響因子(影響力)學(xué)科排名
書目名稱Recent Advances in Information Hiding and Applications網(wǎng)絡(luò)公開度
書目名稱Recent Advances in Information Hiding and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Recent Advances in Information Hiding and Applications被引頻次
書目名稱Recent Advances in Information Hiding and Applications被引頻次學(xué)科排名
書目名稱Recent Advances in Information Hiding and Applications年度引用
書目名稱Recent Advances in Information Hiding and Applications年度引用學(xué)科排名
書目名稱Recent Advances in Information Hiding and Applications讀者反饋
書目名稱Recent Advances in Information Hiding and Applications讀者反饋學(xué)科排名
作者: hemorrhage 時間: 2025-3-21 22:58 作者: 谷類 時間: 2025-3-22 01:17
Shuai Yue,Zhi-Hui Wang,Chin-Chen Changals. Overall, the data confirms most of the oils listed in GRAS as safety, although some of them have no data available or have study describing toxicity. This chapter highlights essential oils potential as natural alternative for increasing food shelf-life through multiple pathways of action, altho作者: Largess 時間: 2025-3-22 07:27 作者: CRUE 時間: 2025-3-22 10:11 作者: 業(yè)余愛好者 時間: 2025-3-22 15:48
Jiande Sun,Ju Liupackaging materials were summarized. Finally, the construction strategy of essential oil in antibacterial packaging system was summarized and the existing problems and future development direction of essential oil antibacterial packaging system were also pointed out.作者: Ruptured-Disk 時間: 2025-3-22 17:57 作者: 致敬 時間: 2025-3-23 00:11 作者: 搏斗 時間: 2025-3-23 04:40
Hsiang-Cheh Huang,Yueh-Hong ChenTyihák 1987). Higher efficiencies, increased solute loading capacity, and reduced solvent development times can be obtained by OPLC when compared to capillary controlled systems such as TLC. If large numbers of samples have to be analyzed, or if some of the components in a mixture are difficult to d作者: inflate 時間: 2025-3-23 09:32
Chin-Feng Lee,Hsing-Ling ChenTyihák 1987). Higher efficiencies, increased solute loading capacity, and reduced solvent development times can be obtained by OPLC when compared to capillary controlled systems such as TLC. If large numbers of samples have to be analyzed, or if some of the components in a mixture are difficult to d作者: 誤傳 時間: 2025-3-23 11:44 作者: Guaff豪情痛飲 時間: 2025-3-23 16:17 作者: 音樂等 時間: 2025-3-23 20:40
The Copyright Protection System for Android Platform,d selectively. Proposed system has following features: (1) computational complexity of watermark embedding process is possibly reduced for handheld mobile system; (2) the watermark can be extracted without the use of the original image; (3) the watermark embedded into an image would not be removed b作者: POLYP 時間: 2025-3-24 01:24 作者: 無所不知 時間: 2025-3-24 06:16
Application of Genetic-Based Wavelet Packet Watermarking for Copyright Protection,marked images, intentional signal processing is expected, and our watermarking algorithm is considered to keep the integrity for the trusted communication. Experimental results demonstrate that the proposed method can increase the capability to resist intentional signal processing for the use of GA.作者: macular-edema 時間: 2025-3-24 07:18
Lossless Text Steganography in Compression Coding,e to protect the embedded message. The extracting embedded message will be meaningless without the secret keys being known. Furthermore, the size of stego-compression-code is less than the size of original file plus secret message in the proposed scheme so that the transmission cost can be reduced. 作者: 牛的細(xì)微差別 時間: 2025-3-24 12:51 作者: biopsy 時間: 2025-3-24 16:19
Video Watermarking with Shot Detection,could be extracted even when only partial video shots are available. It is able to obtain not only higher NC (normalized cross-correlation) value, but also better visual quality compared to directly embedding partial watermark data into shots without adopting DWT.作者: nocturia 時間: 2025-3-24 19:11 作者: Figate 時間: 2025-3-25 01:03
Intelligent Systems Reference Libraryhttp://image.papertrans.cn/r/image/822775.jpg作者: Meditate 時間: 2025-3-25 05:08
https://doi.org/10.1007/978-3-642-28580-6Computational Intelligence; Hiding Technologies; Information Hiding; Intelligent Systems作者: Offensive 時間: 2025-3-25 08:59
Jeng-Shyang Pan,Hsiang-Cheh Huang,Yao ZhaoContains the latest research on recent advances in information hiding techniques.The state of the art on information hiding in intelligent environment is presented in a handbook style.Written by leadi作者: –FER 時間: 2025-3-25 15:32 作者: glamor 時間: 2025-3-25 17:43 作者: 注意 時間: 2025-3-25 22:50 作者: 分貝 時間: 2025-3-26 02:39
ICA-Based Image and Video Watermarking,video processing models are presented, and various independent features corresponding to these models are introduced. Finally, the similarity between the ICA- and watermarking-models is analyzed, and some representative ICA-based image and video watermarking algorithms are presented.作者: 臆斷 時間: 2025-3-26 06:30 作者: 發(fā)生 時間: 2025-3-26 09:28 作者: 陳腐的人 時間: 2025-3-26 14:10
An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring,, none of them is graph coloring based, although graph coloring has been used in many applications. In this work, we propose a VQ-based data hiding scheme using graph coloring. The proposed scheme colored every codeword in the codebook in different colors, each of which represents some bits of secre作者: 繼承人 時間: 2025-3-26 17:08
The Copyright Protection System for Android Platform,r, they will share these photos and information to others. But the photos may be used without consent after they are uploaded to Internet. To avoid this problem, one can embed visible and invisible watermarks into images. However, an additional process for embedding watermarks should be performed be作者: 無彈性 時間: 2025-3-26 23:30
Reversible Data Hiding by Coefficient Adjustment Algorithm,hm mainly consists of three steps, which are block-mean removal, pixel squeezing, and pixel isolation. To provide a large hiding space, the mean removal firstly generates the differenced blocks from an input image. A pixel in the differenced blocks can be obtained by subtracting the original pixel v作者: 廢墟 時間: 2025-3-27 02:09
ICA-Based Image and Video Watermarking,o human visual system and compact representation of images and videos are the key points in the field of image and video analysis. As an unsupervised learning method, Independent Component Analysis (ICA) has been used widely in image and video processing, because it is proved to match human visual s作者: 大罵 時間: 2025-3-27 05:41
Content Based Invariant Image Watermarking with High Capacity,T). The underlying idea of this kind of method is to align the geometric transforms before watermark embedding and extraction. These schemes are usually preceded by watermark synchronization, an operation to determine some local regions for watermark embedding and extraction. Due to the small size o作者: 是突襲 時間: 2025-3-27 13:28
Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization,l BTC method compresses a block of a grayscale image into a bitmap and a pair of quantization numbers. For a color image, which is encoded using R, G, and B channels, the BTC method enhances the compression rate using a common bitmap instead of three naturally formed bitmaps. However, it is difficul作者: Calculus 時間: 2025-3-27 15:33
Application of Genetic-Based Wavelet Packet Watermarking for Copyright Protection, genetic watermarking scheme based on the wavelet packet transform (WPT) for the applications of copyright protection and trusted communication. Wavelet packet transform can be regarded as a generalization of the discrete wavelet transformh (DWT). For the WPT, a best wavelet basis in the sense of ev作者: 姑姑在炫耀 時間: 2025-3-27 19:58 作者: 準(zhǔn)則 時間: 2025-3-27 23:47
A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme,s. The security of acoustic data is an important issue. Particularly, a real-time acoustic steganography is required in a public broadcasting or mobile communication system. This chapter proposes a new steganography scheme with capacity variability and synchronization for secure transmission of acou作者: 思鄉(xiāng)病 時間: 2025-3-28 02:09 作者: 不可侵犯 時間: 2025-3-28 07:12 作者: exhilaration 時間: 2025-3-28 12:46
An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring,t messages. Then the scheme hidden data into the compression code through replacing one codeword in a color with another codeword in another color. The performance of the proposed scheme was evaluated on the basis of embedding capacity and imperceptibility, which proved the scheme’s validity.作者: Lipoma 時間: 2025-3-28 18:22 作者: 分開 時間: 2025-3-28 21:24
rtheless, the emergence of new pests and the resistance of a range of species to chemicals establish the necessity to adopt serious measures to preserve a safe status and eco-friendly approach. Correspondingly, essential oils (EOs) are attractive bioproducts extracted from a range of plant species t作者: 弄皺 時間: 2025-3-29 00:37
Shuai Yue,Zhi-Hui Wang,Chin-Chen Changmicrobial and antioxidant activity. Besides its large use, there is a lack of studies regarding its its safety as food ingredient. In this book chapter, we summarized the main essential oils used as food ingredient, describing its chemical composition, antioxidant activity and potential against food