派博傳思國際中心

標(biāo)題: Titlebook: Information Hiding; Third International Andreas Pfitzmann Conference proceedings 2000 Springer-Verlag Berlin Heidelberg 2000 Authenticatio [打印本頁]

作者: 遮蔽    時(shí)間: 2025-3-21 17:25
書目名稱Information Hiding影響因子(影響力)




書目名稱Information Hiding影響因子(影響力)學(xué)科排名




書目名稱Information Hiding網(wǎng)絡(luò)公開度




書目名稱Information Hiding網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information Hiding被引頻次




書目名稱Information Hiding被引頻次學(xué)科排名




書目名稱Information Hiding年度引用




書目名稱Information Hiding年度引用學(xué)科排名




書目名稱Information Hiding讀者反饋




書目名稱Information Hiding讀者反饋學(xué)科排名





作者: 人造    時(shí)間: 2025-3-21 20:14

作者: 盡管    時(shí)間: 2025-3-22 03:24
Natori Shinhnologies through chapters describing basicstatistical modeling techniques for language and speech, the use ofHidden Markov Models in continuous speech recognition, the developmentof dialogue systems, part-of-speech tagging and partial parsing,data-oriented parsing and n-gram language modeling. .The
作者: ROOF    時(shí)間: 2025-3-22 07:19

作者: Geyser    時(shí)間: 2025-3-22 09:08
Jiri Fridrich,Rui Duir macro-statistic features in Chap. . and the lexical and grammatical characteristics in Chaps. . and ., while the present chapter is an interface between the empirical findings and theoretical hypotheses, that is, it is a combination of descriptive translation studies with the “pure translation th
作者: 極大痛苦    時(shí)間: 2025-3-22 16:30
Andreas Westfeld,Andreas Pfitzmanns in the same language with an ultimate interest in the so-called translation universals, which were first defined by Baker (1993: 43) as the “universal features of translation, that is features which typically occur in translated text rather than original utterances and which are not the result of
作者: 令人作嘔    時(shí)間: 2025-3-22 18:43
Joshua R. Smith,Chris Dodge and meaning of each type and variation between the two in the last two centuries. A survey is given of the incidence of each type in each decade of COHA, and followed up with data from the BNC, with comments on the adjective from the point of view of the Great Complement Shift. The study then turns
作者: glisten    時(shí)間: 2025-3-22 23:02

作者: Limpid    時(shí)間: 2025-3-23 02:24
Scott Craver about some of the chief patterns of morphosyntactic variation within these texts, under the theoretical assumption that these patterns are indicative of register variation. This variation realizes changes in the situational contexts that gave rise to each of the texts. We ultimately find that both
作者: glomeruli    時(shí)間: 2025-3-23 09:09

作者: ASSAY    時(shí)間: 2025-3-23 17:52

作者: Introduction    時(shí)間: 2025-3-23 19:20
Alessia De Rosa,Mauro Barni,Franco Bartolini,Vito Cappellini,Alessandro Pivatake translational language as a source of examples for the discussion of translation techniques, the focus being on the choice of words or structures; little is said about the language as a whole. Nowadays, translational language is an independent system or variety, of which the holistic and macros
作者: 債務(wù)    時(shí)間: 2025-3-24 00:14

作者: MAIM    時(shí)間: 2025-3-24 04:05
Pedro Lamy,Jose’ Martinho,Tiago Rosa,Maria Paula Queluzrimental methods and small-scale of research data. The emergence of Corpus-based Interpreting Studies (CIS) in recent years has helped to strengthen the ecological validity and significance of interpreting studies. The inception of CIS in China in 2009 (Hu and Tao?2009; Zhang 2009; Wang and Ye 2009)
作者: FILTH    時(shí)間: 2025-3-24 07:24
Shelby Pereira,Thierry Puntake translational language as a source of examples for the discussion of translation techniques, the focus being on the choice of words or structures; little is said about the language as a whole. Nowadays, translational language is an independent system or variety, of which the holistic and macros
作者: RENIN    時(shí)間: 2025-3-24 14:16
Sviatoslav Voloshynovskiy,Alexander Herrigel,Nazanin Baumgaertner,Thierry Punth Western languages in mind. Particular attention will be given to Chinese scholars’ contributions to the study of translational universal and the accompanying concerns raised with regard to its validity and applicability. Empirical studies on Chinese-specific translational features over the last d
作者: 禍害隱伏    時(shí)間: 2025-3-24 17:03
Martin Kuttertake translational language as a source of examples for the discussion of translation techniques, the focus being on the choice of words or structures; little is said about the language as a whole. Nowadays, translational language is an independent system or variety, of which the holistic and macros
作者: 統(tǒng)治人類    時(shí)間: 2025-3-24 20:28

作者: 拍下盜公款    時(shí)間: 2025-3-25 01:11

作者: harpsichord    時(shí)間: 2025-3-25 07:02

作者: 搖晃    時(shí)間: 2025-3-25 09:17
Secure Steganographic Methods for Palette Imagesroduced the concept of optimal parity assignment for the color palette and designed an efficient algorithm that finds the optimal parity assignment. The optimal parity is independent of the image histogram and depends only on the image palette. Thus, it can be used for increasing the security of ste
作者: 發(fā)源    時(shí)間: 2025-3-25 15:15
Attacks on Steganographic Systemsre steganographic algorithms, the development of attacks is essential to assess security. We present both ., making use of the ability of humans to clearly discern between noise and visual patterns, and . which are much easier to automate..The visual attacks presented here exemplify that at least Ez
作者: 不開心    時(shí)間: 2025-3-25 18:54

作者: BACLE    時(shí)間: 2025-3-25 23:41

作者: FAZE    時(shí)間: 2025-3-26 00:10
Zero Knowledge Watermark Detection watermark within an object, in order to prove ownership or detect theft of said object, may open the door to subsequent theft, by providing attackers with the information they need to remove the watermark. The idea of . watermarking, of proving the existence of a mark without revealing what that ma
作者: 夸張    時(shí)間: 2025-3-26 04:29
Proving Ownership of Digital Contentetectable, and thus deterring people from misuse, is the most promising measure currently known. To achieve this, most proposals apply watermarking techniques and focus on resolving the ownership in disputes which may arise after a misuse has been detected. Here a trusted third party (judge) compare
作者: 起來了    時(shí)間: 2025-3-26 11:33
Error- and Collusion-Secure Fingerprinting for Digital Datal data can be done by watermarking techniques, which are mainly a branch of signal processing. Most watermarking methods, however, do not treat colluding adversaries who have obtained more than one copy, compare their copies, see differences and use this information to make a copy without a fingerpr
作者: DNR215    時(shí)間: 2025-3-26 13:14
Computing the Probability of False Watermark Detectiona predefined watermark vector, and comparing the result against a threshold. We show that, if the probability density function of vectors that arise from random, unwatermarked media is a zero-mean, spherical Gaussian, then the probability that such a detector will give a false detection is given exa
作者: 女歌星    時(shí)間: 2025-3-26 19:35
Optimum Decoding of Non-additive Full Frame DFT Watermarksmain according to an additive-multiplicative rule. The structure of the optimum decoder is derived based on statistical decision theory. The Neyman-Pearson criterion is used to minimize the probability of missing the watermark for a given false detection rate. Experimental results highlights the sup
作者: 整潔漂亮    時(shí)間: 2025-3-27 00:23

作者: calorie    時(shí)間: 2025-3-27 04:37

作者: Ambiguous    時(shí)間: 2025-3-27 06:59
Fast Robust Template Matching for Affine Resistant Image Watermarksthod for the secure and robust copyright protection of digital images. We present an approach for embedding a digital watermark into an image using the Fourier transform. To this watermark is added a template in the Fourier transform domain to render the method robust against general linear transfor
作者: acrobat    時(shí)間: 2025-3-27 12:40

作者: Antioxidant    時(shí)間: 2025-3-27 15:30

作者: licence    時(shí)間: 2025-3-27 17:58
On the Design of a Watermarking System: Considerations and Rationalesm of signal detection in the presence of (structured) noise. The paper builds on the mathematical results from several previously published papers (by our own research group or by others) to verify and support our discussion. In an attempt to unify the theoretical analysis of watermarking schemes, w
作者: anachronistic    時(shí)間: 2025-3-27 21:55

作者: 協(xié)定    時(shí)間: 2025-3-28 04:33

作者: Junction    時(shí)間: 2025-3-28 07:56

作者: 侵害    時(shí)間: 2025-3-28 10:36

作者: 共和國    時(shí)間: 2025-3-28 18:10
Andreas Westfeld,Andreas Pfitzmanne effect of the SL upon the translation is admittedly inevitable; the language of the translated texts, on the other hand, seems to be different to the TL as well (McEnery and Xiao 2007a). The second type of differences can be detected by contrastive studies between the translated texts and the comp
作者: 啞巴    時(shí)間: 2025-3-28 22:29

作者: 禍害隱伏    時(shí)間: 2025-3-28 23:14
Teddy Furon,Pierre Duhamelct and the type of complement on the basis of the agentivity of the subject in question. The chapter investigates the applicability of the Choice Principle in the case of the adjective . over several decades of COHA, and the implications of the principle for interpreting . infinitives and gerundial
作者: 摻假    時(shí)間: 2025-3-29 04:40
Scott Craverf entire texts, as semantic units, rather than portions of texts, which are components of those units. The papyri and ostraca in our third corpus introduce a third level of analysis, allowing for a gradient distinction between literary and non-literary texts. This study serves as a point of referenc
作者: 使聲音降低    時(shí)間: 2025-3-29 11:18
André Adelsbach,Birgit Pfitzmann,Ahmad-Reza Sadeghi understanding of SFL, and promote its potential interaction with other theories. In addition, they demonstrate the great potential that SFL holds for solving language-related questions in a variety of discourses..978-981-15-4773-7978-981-15-4771-3Series ISSN 2198-9869 Series E-ISSN 2198-9877
作者: Anthrp    時(shí)間: 2025-3-29 11:44
Hans-Jürgen Guth,Birgit Pfitzmannf entire texts, as semantic units, rather than portions of texts, which are components of those units. The papyri and ostraca in our third corpus introduce a third level of analysis, allowing for a gradient distinction between literary and non-literary texts. This study serves as a point of referenc
作者: 正常    時(shí)間: 2025-3-29 19:36
Matt L. Miller,Jeffrey A. Bloom understanding of SFL, and promote its potential interaction with other theories. In addition, they demonstrate the great potential that SFL holds for solving language-related questions in a variety of discourses..978-981-15-4773-7978-981-15-4771-3Series ISSN 2198-9869 Series E-ISSN 2198-9877
作者: Relinquish    時(shí)間: 2025-3-29 21:58

作者: 道學(xué)氣    時(shí)間: 2025-3-30 03:13
Joachim J. Eggers,Bernd Girod the interpreting process with large-scale authentic data. This chapter reviews the development of CIS in China based on the statistics of interpreting corpora developed in the region and journal articles and published books (or book chapters) published in the region. It summarises the techniques us
作者: faction    時(shí)間: 2025-3-30 04:39

作者: 作嘔    時(shí)間: 2025-3-30 11:50
Shelby Pereira,Thierry Punok into the evolution of Mandarin from a CLC (construction’s load capacity) perspective. It finds that the evolution of Mandarin is clearly shown in the increase of CLC and in the structural complexity of the constituents in the constructions, and it goes in parallel with the sudden and rapid change
作者: orthodox    時(shí)間: 2025-3-30 15:27
Sviatoslav Voloshynovskiy,Alexander Herrigel,Nazanin Baumgaertner,Thierry Punir formation, how they compare to those found in Chinese translational data, and the difficulties involved in collecting and annotating interpreting corpora in the Chinese language. This chapter will also explore methodologies that apply corpus findings of translational Chinese on the teaching of tr
作者: 觀點(diǎn)    時(shí)間: 2025-3-30 18:30

作者: Magnificent    時(shí)間: 2025-3-30 22:27
Secure Steganographic Methods for Palette Images embedding-while-dithering, technique has been designed for palette images obtained from true color images using color quantization and dithering. In this technique, both the color quantization error and the error due to message embedding are diffused through the image to avoid introducing artifacts
作者: 言行自由    時(shí)間: 2025-3-31 02:50

作者: microscopic    時(shí)間: 2025-3-31 05:31
Error- and Collusion-Secure Fingerprinting for Digital Data.This assumption can be justified by making each individual mark fault-tolerant on the watermarking layer, e.g., by replication, but that would imply a significant increase in the data size needed. Instead, here we implement the fault tolerance more efficiently on the cryptographic layer by generali
作者: Concomitant    時(shí)間: 2025-3-31 12:47
A Stochastic Approach to Content Adaptive Digital Image Watermarkingussian model. We show that the problem of the watermark estimation is equivalent to image denoising and derive content adaptive criteria. Results show that watermark visibility is noticeably decreased, while at the same time enhancing the energy of the watermark.
作者: SHOCK    時(shí)間: 2025-3-31 14:59
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarkingo modification and rescaling of frames..It is shown that, for the spread spectrum signal described in the paper, it is possible to positively detect the presence of a watermark without necessarily decoding it, given only the key used to generate it. To do that, the Bayesian approach allows the deduc
作者: 寬敞    時(shí)間: 2025-3-31 20:32
tive teaching approaches to a growing number of cross-disciplinary postgraduate students longing to improve their translation skills and competence..978-981-15-8997-3978-981-15-8995-9Series ISSN 2510-4802 Series E-ISSN 2510-4810
作者: interlude    時(shí)間: 2025-4-1 01:45

作者: 走調(diào)    時(shí)間: 2025-4-1 02:18

作者: extinct    時(shí)間: 2025-4-1 06:09

作者: 天真    時(shí)間: 2025-4-1 12:03

作者: acrimony    時(shí)間: 2025-4-1 16:59

作者: HEAVY    時(shí)間: 2025-4-1 19:46

作者: 健壯    時(shí)間: 2025-4-2 01:04
Zero Knowledge Watermark Detection watermark within an object, in order to prove ownership or detect theft of said object, may open the door to subsequent theft, by providing attackers with the information they need to remove the watermark. The idea of . watermarking, of proving the existence of a mark without revealing what that mark is, can help address this problem and others.
作者: 厚顏    時(shí)間: 2025-4-2 02:55





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
枞阳县| 双辽市| 娱乐| 拜泉县| 凤山县| 彰化市| 庆阳市| 新绛县| 辰溪县| 卫辉市| 车险| 泾源县| 楚雄市| 新安县| 五台县| 会宁县| 安宁市| 达孜县| 讷河市| 章丘市| 阿拉善左旗| 隆子县| 芮城县| 嵊泗县| 临漳县| 渝中区| 绥化市| 塘沽区| 天台县| 慈溪市| 邯郸县| 华容县| 额尔古纳市| 阳曲县| 福建省| 黑水县| 苗栗市| 尼玛县| 淮南市| 桐梓县| 三都|