標(biāo)題: Titlebook: Information Hiding; Third International Andreas Pfitzmann Conference proceedings 2000 Springer-Verlag Berlin Heidelberg 2000 Authenticatio [打印本頁] 作者: 遮蔽 時(shí)間: 2025-3-21 17:25
書目名稱Information Hiding影響因子(影響力)
書目名稱Information Hiding影響因子(影響力)學(xué)科排名
書目名稱Information Hiding網(wǎng)絡(luò)公開度
書目名稱Information Hiding網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Hiding被引頻次
書目名稱Information Hiding被引頻次學(xué)科排名
書目名稱Information Hiding年度引用
書目名稱Information Hiding年度引用學(xué)科排名
書目名稱Information Hiding讀者反饋
書目名稱Information Hiding讀者反饋學(xué)科排名
作者: 人造 時(shí)間: 2025-3-21 20:14 作者: 盡管 時(shí)間: 2025-3-22 03:24
Natori Shinhnologies through chapters describing basicstatistical modeling techniques for language and speech, the use ofHidden Markov Models in continuous speech recognition, the developmentof dialogue systems, part-of-speech tagging and partial parsing,data-oriented parsing and n-gram language modeling. .The作者: ROOF 時(shí)間: 2025-3-22 07:19 作者: Geyser 時(shí)間: 2025-3-22 09:08
Jiri Fridrich,Rui Duir macro-statistic features in Chap. . and the lexical and grammatical characteristics in Chaps. . and ., while the present chapter is an interface between the empirical findings and theoretical hypotheses, that is, it is a combination of descriptive translation studies with the “pure translation th作者: 極大痛苦 時(shí)間: 2025-3-22 16:30
Andreas Westfeld,Andreas Pfitzmanns in the same language with an ultimate interest in the so-called translation universals, which were first defined by Baker (1993: 43) as the “universal features of translation, that is features which typically occur in translated text rather than original utterances and which are not the result of 作者: 令人作嘔 時(shí)間: 2025-3-22 18:43
Joshua R. Smith,Chris Dodge and meaning of each type and variation between the two in the last two centuries. A survey is given of the incidence of each type in each decade of COHA, and followed up with data from the BNC, with comments on the adjective from the point of view of the Great Complement Shift. The study then turns作者: glisten 時(shí)間: 2025-3-22 23:02 作者: Limpid 時(shí)間: 2025-3-23 02:24
Scott Craver about some of the chief patterns of morphosyntactic variation within these texts, under the theoretical assumption that these patterns are indicative of register variation. This variation realizes changes in the situational contexts that gave rise to each of the texts. We ultimately find that both 作者: glomeruli 時(shí)間: 2025-3-23 09:09 作者: ASSAY 時(shí)間: 2025-3-23 17:52 作者: Introduction 時(shí)間: 2025-3-23 19:20
Alessia De Rosa,Mauro Barni,Franco Bartolini,Vito Cappellini,Alessandro Pivatake translational language as a source of examples for the discussion of translation techniques, the focus being on the choice of words or structures; little is said about the language as a whole. Nowadays, translational language is an independent system or variety, of which the holistic and macros作者: 債務(wù) 時(shí)間: 2025-3-24 00:14 作者: MAIM 時(shí)間: 2025-3-24 04:05
Pedro Lamy,Jose’ Martinho,Tiago Rosa,Maria Paula Queluzrimental methods and small-scale of research data. The emergence of Corpus-based Interpreting Studies (CIS) in recent years has helped to strengthen the ecological validity and significance of interpreting studies. The inception of CIS in China in 2009 (Hu and Tao?2009; Zhang 2009; Wang and Ye 2009)作者: FILTH 時(shí)間: 2025-3-24 07:24
Shelby Pereira,Thierry Puntake translational language as a source of examples for the discussion of translation techniques, the focus being on the choice of words or structures; little is said about the language as a whole. Nowadays, translational language is an independent system or variety, of which the holistic and macros作者: RENIN 時(shí)間: 2025-3-24 14:16
Sviatoslav Voloshynovskiy,Alexander Herrigel,Nazanin Baumgaertner,Thierry Punth Western languages in mind. Particular attention will be given to Chinese scholars’ contributions to the study of translational universal and the accompanying concerns raised with regard to its validity and applicability. Empirical studies on Chinese-specific translational features over the last d作者: 禍害隱伏 時(shí)間: 2025-3-24 17:03
Martin Kuttertake translational language as a source of examples for the discussion of translation techniques, the focus being on the choice of words or structures; little is said about the language as a whole. Nowadays, translational language is an independent system or variety, of which the holistic and macros作者: 統(tǒng)治人類 時(shí)間: 2025-3-24 20:28 作者: 拍下盜公款 時(shí)間: 2025-3-25 01:11 作者: harpsichord 時(shí)間: 2025-3-25 07:02 作者: 搖晃 時(shí)間: 2025-3-25 09:17
Secure Steganographic Methods for Palette Imagesroduced the concept of optimal parity assignment for the color palette and designed an efficient algorithm that finds the optimal parity assignment. The optimal parity is independent of the image histogram and depends only on the image palette. Thus, it can be used for increasing the security of ste作者: 發(fā)源 時(shí)間: 2025-3-25 15:15
Attacks on Steganographic Systemsre steganographic algorithms, the development of attacks is essential to assess security. We present both ., making use of the ability of humans to clearly discern between noise and visual patterns, and . which are much easier to automate..The visual attacks presented here exemplify that at least Ez作者: 不開心 時(shí)間: 2025-3-25 18:54 作者: BACLE 時(shí)間: 2025-3-25 23:41 作者: FAZE 時(shí)間: 2025-3-26 00:10
Zero Knowledge Watermark Detection watermark within an object, in order to prove ownership or detect theft of said object, may open the door to subsequent theft, by providing attackers with the information they need to remove the watermark. The idea of . watermarking, of proving the existence of a mark without revealing what that ma作者: 夸張 時(shí)間: 2025-3-26 04:29
Proving Ownership of Digital Contentetectable, and thus deterring people from misuse, is the most promising measure currently known. To achieve this, most proposals apply watermarking techniques and focus on resolving the ownership in disputes which may arise after a misuse has been detected. Here a trusted third party (judge) compare作者: 起來了 時(shí)間: 2025-3-26 11:33
Error- and Collusion-Secure Fingerprinting for Digital Datal data can be done by watermarking techniques, which are mainly a branch of signal processing. Most watermarking methods, however, do not treat colluding adversaries who have obtained more than one copy, compare their copies, see differences and use this information to make a copy without a fingerpr作者: DNR215 時(shí)間: 2025-3-26 13:14
Computing the Probability of False Watermark Detectiona predefined watermark vector, and comparing the result against a threshold. We show that, if the probability density function of vectors that arise from random, unwatermarked media is a zero-mean, spherical Gaussian, then the probability that such a detector will give a false detection is given exa作者: 女歌星 時(shí)間: 2025-3-26 19:35
Optimum Decoding of Non-additive Full Frame DFT Watermarksmain according to an additive-multiplicative rule. The structure of the optimum decoder is derived based on statistical decision theory. The Neyman-Pearson criterion is used to minimize the probability of missing the watermark for a given false detection rate. Experimental results highlights the sup作者: 整潔漂亮 時(shí)間: 2025-3-27 00:23 作者: calorie 時(shí)間: 2025-3-27 04:37 作者: Ambiguous 時(shí)間: 2025-3-27 06:59
Fast Robust Template Matching for Affine Resistant Image Watermarksthod for the secure and robust copyright protection of digital images. We present an approach for embedding a digital watermark into an image using the Fourier transform. To this watermark is added a template in the Fourier transform domain to render the method robust against general linear transfor作者: acrobat 時(shí)間: 2025-3-27 12:40 作者: Antioxidant 時(shí)間: 2025-3-27 15:30 作者: licence 時(shí)間: 2025-3-27 17:58
On the Design of a Watermarking System: Considerations and Rationalesm of signal detection in the presence of (structured) noise. The paper builds on the mathematical results from several previously published papers (by our own research group or by others) to verify and support our discussion. In an attempt to unify the theoretical analysis of watermarking schemes, w作者: anachronistic 時(shí)間: 2025-3-27 21:55 作者: 協(xié)定 時(shí)間: 2025-3-28 04:33 作者: Junction 時(shí)間: 2025-3-28 07:56 作者: 侵害 時(shí)間: 2025-3-28 10:36 作者: 共和國 時(shí)間: 2025-3-28 18:10
Andreas Westfeld,Andreas Pfitzmanne effect of the SL upon the translation is admittedly inevitable; the language of the translated texts, on the other hand, seems to be different to the TL as well (McEnery and Xiao 2007a). The second type of differences can be detected by contrastive studies between the translated texts and the comp作者: 啞巴 時(shí)間: 2025-3-28 22:29 作者: 禍害隱伏 時(shí)間: 2025-3-28 23:14
Teddy Furon,Pierre Duhamelct and the type of complement on the basis of the agentivity of the subject in question. The chapter investigates the applicability of the Choice Principle in the case of the adjective . over several decades of COHA, and the implications of the principle for interpreting . infinitives and gerundial 作者: 摻假 時(shí)間: 2025-3-29 04:40
Scott Craverf entire texts, as semantic units, rather than portions of texts, which are components of those units. The papyri and ostraca in our third corpus introduce a third level of analysis, allowing for a gradient distinction between literary and non-literary texts. This study serves as a point of referenc作者: 使聲音降低 時(shí)間: 2025-3-29 11:18
André Adelsbach,Birgit Pfitzmann,Ahmad-Reza Sadeghi understanding of SFL, and promote its potential interaction with other theories. In addition, they demonstrate the great potential that SFL holds for solving language-related questions in a variety of discourses..978-981-15-4773-7978-981-15-4771-3Series ISSN 2198-9869 Series E-ISSN 2198-9877 作者: Anthrp 時(shí)間: 2025-3-29 11:44
Hans-Jürgen Guth,Birgit Pfitzmannf entire texts, as semantic units, rather than portions of texts, which are components of those units. The papyri and ostraca in our third corpus introduce a third level of analysis, allowing for a gradient distinction between literary and non-literary texts. This study serves as a point of referenc作者: 正常 時(shí)間: 2025-3-29 19:36
Matt L. Miller,Jeffrey A. Bloom understanding of SFL, and promote its potential interaction with other theories. In addition, they demonstrate the great potential that SFL holds for solving language-related questions in a variety of discourses..978-981-15-4773-7978-981-15-4771-3Series ISSN 2198-9869 Series E-ISSN 2198-9877 作者: Relinquish 時(shí)間: 2025-3-29 21:58 作者: 道學(xué)氣 時(shí)間: 2025-3-30 03:13
Joachim J. Eggers,Bernd Girod the interpreting process with large-scale authentic data. This chapter reviews the development of CIS in China based on the statistics of interpreting corpora developed in the region and journal articles and published books (or book chapters) published in the region. It summarises the techniques us作者: faction 時(shí)間: 2025-3-30 04:39 作者: 作嘔 時(shí)間: 2025-3-30 11:50
Shelby Pereira,Thierry Punok into the evolution of Mandarin from a CLC (construction’s load capacity) perspective. It finds that the evolution of Mandarin is clearly shown in the increase of CLC and in the structural complexity of the constituents in the constructions, and it goes in parallel with the sudden and rapid change作者: orthodox 時(shí)間: 2025-3-30 15:27
Sviatoslav Voloshynovskiy,Alexander Herrigel,Nazanin Baumgaertner,Thierry Punir formation, how they compare to those found in Chinese translational data, and the difficulties involved in collecting and annotating interpreting corpora in the Chinese language. This chapter will also explore methodologies that apply corpus findings of translational Chinese on the teaching of tr作者: 觀點(diǎn) 時(shí)間: 2025-3-30 18:30 作者: Magnificent 時(shí)間: 2025-3-30 22:27
Secure Steganographic Methods for Palette Images embedding-while-dithering, technique has been designed for palette images obtained from true color images using color quantization and dithering. In this technique, both the color quantization error and the error due to message embedding are diffused through the image to avoid introducing artifacts作者: 言行自由 時(shí)間: 2025-3-31 02:50 作者: microscopic 時(shí)間: 2025-3-31 05:31
Error- and Collusion-Secure Fingerprinting for Digital Data.This assumption can be justified by making each individual mark fault-tolerant on the watermarking layer, e.g., by replication, but that would imply a significant increase in the data size needed. Instead, here we implement the fault tolerance more efficiently on the cryptographic layer by generali作者: Concomitant 時(shí)間: 2025-3-31 12:47
A Stochastic Approach to Content Adaptive Digital Image Watermarkingussian model. We show that the problem of the watermark estimation is equivalent to image denoising and derive content adaptive criteria. Results show that watermark visibility is noticeably decreased, while at the same time enhancing the energy of the watermark.作者: SHOCK 時(shí)間: 2025-3-31 14:59
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarkingo modification and rescaling of frames..It is shown that, for the spread spectrum signal described in the paper, it is possible to positively detect the presence of a watermark without necessarily decoding it, given only the key used to generate it. To do that, the Bayesian approach allows the deduc作者: 寬敞 時(shí)間: 2025-3-31 20:32
tive teaching approaches to a growing number of cross-disciplinary postgraduate students longing to improve their translation skills and competence..978-981-15-8997-3978-981-15-8995-9Series ISSN 2510-4802 Series E-ISSN 2510-4810 作者: interlude 時(shí)間: 2025-4-1 01:45 作者: 走調(diào) 時(shí)間: 2025-4-1 02:18 作者: extinct 時(shí)間: 2025-4-1 06:09 作者: 天真 時(shí)間: 2025-4-1 12:03 作者: acrimony 時(shí)間: 2025-4-1 16:59 作者: HEAVY 時(shí)間: 2025-4-1 19:46 作者: 健壯 時(shí)間: 2025-4-2 01:04
Zero Knowledge Watermark Detection watermark within an object, in order to prove ownership or detect theft of said object, may open the door to subsequent theft, by providing attackers with the information they need to remove the watermark. The idea of . watermarking, of proving the existence of a mark without revealing what that mark is, can help address this problem and others.作者: 厚顏 時(shí)間: 2025-4-2 02:55