派博傳思國際中心

標(biāo)題: Titlebook: Intelligent Techniques in Signal Processing for Multimedia Security; Nilanjan Dey,V. Santhi Book 2017 Springer International Publishing Sw [打印本頁]

作者: Alacrity    時間: 2025-3-21 16:22
書目名稱Intelligent Techniques in Signal Processing for Multimedia Security影響因子(影響力)




書目名稱Intelligent Techniques in Signal Processing for Multimedia Security影響因子(影響力)學(xué)科排名




書目名稱Intelligent Techniques in Signal Processing for Multimedia Security網(wǎng)絡(luò)公開度




書目名稱Intelligent Techniques in Signal Processing for Multimedia Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Intelligent Techniques in Signal Processing for Multimedia Security被引頻次




書目名稱Intelligent Techniques in Signal Processing for Multimedia Security被引頻次學(xué)科排名




書目名稱Intelligent Techniques in Signal Processing for Multimedia Security年度引用




書目名稱Intelligent Techniques in Signal Processing for Multimedia Security年度引用學(xué)科排名




書目名稱Intelligent Techniques in Signal Processing for Multimedia Security讀者反饋




書目名稱Intelligent Techniques in Signal Processing for Multimedia Security讀者反饋學(xué)科排名





作者: Ceremony    時間: 2025-3-21 20:21

作者: foodstuff    時間: 2025-3-22 00:55

作者: 心胸狹窄    時間: 2025-3-22 06:21
Information Hiding: Steganographyre the data, the appearance of encrypted images and video streams makes them vulnerable to attacks. This situation can be disastrous in cases where security and privacy are of utmost importance, such as in military, medical, or covert applications. This drawback of cryptography is one of the many fa
作者: Peculate    時間: 2025-3-22 09:34
Digital Watermarking: A Potential Solution for Multimedia Authenticationation of the intellectual artifact. The combining, replication, and distribution facility of the digital media such as text, images, audio, and video easier and faster has no doubt revolutionized the world. However, the unauthorized use and maldistribution of information by online pirates is the sol
作者: 離開就切除    時間: 2025-3-22 13:33

作者: 羊欄    時間: 2025-3-22 20:29
Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decompositiog techniques was introduced. However, several popular watermarking techniques consume much more time to embed and extract the hidden message. In this current work, a randomized singular value decomposition (rSVD)-based watermarking technique has been proposed in order to avoid such problems. In this
作者: 妨礙    時間: 2025-3-23 00:48

作者: 切掉    時間: 2025-3-23 04:25
Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in g (OFDM) is the most reliable modulation technique which has been adopted. To reduce the redundancy, storage requirements, and communication costs and to protect our data from eavesdropping, data compression algorithms are used. With the increasing demand of secure multimedia, there is a need to dev
作者: debble    時間: 2025-3-23 06:22
Hand Image Biometric Based Personal Authentication Systemrong resistance against the unauthorized access and easy to use modality from the user point of view. This chapter presents an approach for the personal authentication using geometrical structure of hand images. The proposed approach consists of many phases like acquisition of hand images of the use
作者: 豐滿中國    時間: 2025-3-23 10:42

作者: padding    時間: 2025-3-23 16:50
Face Recognition Under Dry and Wet Face Conditionsvely. However, none of the works has made an attempt to address a special case of traditional face recognition, i.e., face recognition under dry and wet face conditions. Here, the gallery face is supposed to be dry face and the probe is a wet face, which comes into picture if the face recognition is
作者: 瘙癢    時間: 2025-3-23 19:19
Improved Approach for 3D Face Characterizationization, expression recognition, human–computer interaction and face tracking. We are interested in the extraction of the pertinent features in 3D face. In this paper, we propose an improved algorithm for 3D face characterization. We propose novel characteristics based on seven salient points of the
作者: PHON    時間: 2025-3-24 00:17
Attendance Recording System Using Partial Face Recognition Algorithmded in the maintenance and management of the traditional attendance sheets is tedious as it costs quite a time for the lecturer. Thus, there is a requirement for robust computerized biometric-based attendance recording system (ARS). Face recognition-based methods are a potential replacement for conv
作者: Osteoarthritis    時間: 2025-3-24 02:43
Automatic Human Emotion Recognition in Surveillance Videomputer vision. The recognition of complete-body expressions is significantly harder, because the pattern of the human pose has additional degrees of self-determination than the face alone, and its overall shape varies robustly during articulated motion. This chapter presents a method for emotion rec
作者: Dorsal-Kyphosis    時間: 2025-3-24 08:39

作者: 朋黨派系    時間: 2025-3-24 12:36

作者: 美學(xué)    時間: 2025-3-24 17:44
nctions (VNF) to be executed according to a given order. The running of VNFs needs the instantiation of VNF Instances (VNFIs) that are software modules executed on Virtual Machines. In this paper we cope with the migration problem of the VNFIs needed in the low traffic periods to switch off servers
作者: 震驚    時間: 2025-3-24 19:50

作者: 不適當(dāng)    時間: 2025-3-24 23:52

作者: Antagonism    時間: 2025-3-25 05:21
Anant M. Bagade,Sanjay N. Talbartal sytems.Reinforces basic principles with worked examples This book develops the concepts for the transmission of digital information sequences through analog, band limited channels, including the topics of pulse shaping, channels with amplitude and delay distortion, eye patterns, zero forcing and
作者: Transfusion    時間: 2025-3-25 09:12

作者: Palpate    時間: 2025-3-25 13:09
Kaiser J. Giri,Rumaan Bashir for chaotic optical communications. Basic concepts and theoretical framework are reviewed. Experimental results are presented to demonstrate the fundamental concepts. Numerical computations are employed for mapping the dynamical states and for illustrating certain detailed characteristics of the ch
作者: Expressly    時間: 2025-3-25 17:06

作者: maverick    時間: 2025-3-25 23:49
Sayan Chakraborty,Souvik Chatterjee,Nilanjan Dey,Amira S. Ashour,Aboul Ella Hassaniena which characterize and constitute a worldly perspective that is somehow distinct from that of the foreign world views that have influenced African peoples), this chapter aims to fill a major gap in the study of digital communication. It does so by discussing the Ancient Kemetian/Egyptian genesis o
作者: guzzle    時間: 2025-3-26 01:27

作者: miscreant    時間: 2025-3-26 05:01

作者: 詩集    時間: 2025-3-26 10:54

作者: Headstrong    時間: 2025-3-26 14:17
Ravinder Kumarveral years due to the demand for processors that are smaller, faster, and dissipate less power. Unfortunately, this means that many of these datapaths will be complex both algorithmically and circuit- wise. As the complexity of the chips increases, less importance will be placed on understanding ho
作者: Germinate    時間: 2025-3-26 20:47
M. Sivarathinabala,S. Abirami,R. Baskaranol engineering. This role has in fact grown in importance over the years because of the increasing complexities of the control tasks considered. These tasks required the corresponding increases which have occurred in the sophistication of the computing hardware, design methods and software tools ava
作者: 規(guī)范就好    時間: 2025-3-26 21:22

作者: ARENA    時間: 2025-3-27 04:48

作者: 暫時過來    時間: 2025-3-27 07:27

作者: 具體    時間: 2025-3-27 11:22

作者: 消滅    時間: 2025-3-27 17:11
Intelligent Morphing and Steganography Techniques for Multimedia Securitynt morphing and steganography techniques. Hybrid approaches using morphing for steganography have a special status among steganographic systems as they combine both the features of morphing and steganography to overcome the shortcomings of individual methods.
作者: 刺耳    時間: 2025-3-27 19:54

作者: 合法    時間: 2025-3-27 23:18

作者: Oratory    時間: 2025-3-28 06:08

作者: 傾聽    時間: 2025-3-28 06:23
Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decompositio work, firstly, the watermark is embedded into the cover image using singular value decomposition, and then the rSVD is employed. Finally, the obtained results were compared to check the time complexity of both methods and to compare the quality of watermarked image and recovered watermarks.
作者: Urgency    時間: 2025-3-28 14:12
Security of Multimedia Contents: A Brieff overview of the multimedia security problem in the prevailing research work in the various applications. It provided evolution of the different hiding techniques along with their properties and requirements. Finally, some challenges are addressed for future research direction.
作者: 沒有貧窮    時間: 2025-3-28 17:13

作者: 現(xiàn)暈光    時間: 2025-3-28 21:42

作者: deface    時間: 2025-3-29 00:58

作者: 受人支配    時間: 2025-3-29 04:33

作者: 微生物    時間: 2025-3-29 09:04
Book 2017umerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern
作者: RENAL    時間: 2025-3-29 13:43

作者: 整頓    時間: 2025-3-29 18:25

作者: 致詞    時間: 2025-3-29 20:40
Ravinder Kumar as designs are getting more complex less understanding is going into a particular implementation because it can be generated automati- cally. Although software tools are a highly valuable asse978-1-4613-4725-5978-1-4419-8931-4
作者: harmony    時間: 2025-3-30 03:10
d how to migrate VNFI in response to changes to SFC request intensity and location. The objective is to minimize the total energy consumption given by the sum of the consolidation and migration energies. The obtained results show how the policies allows for a lower energy consumption with respect to
作者: Mutter    時間: 2025-3-30 04:57
d how to migrate VNFI in response to changes to SFC request intensity and location. The objective is to minimize the total energy consumption given by the sum of the consolidation and migration energies. The obtained results show how the policies allows for a lower energy consumption with respect to
作者: HUMP    時間: 2025-3-30 10:10

作者: 誤傳    時間: 2025-3-30 13:21

作者: ANTH    時間: 2025-3-30 18:06

作者: 外科醫(yī)生    時間: 2025-3-30 22:51
H. R. Lakshmi,B. Surekha,S. Viswanadha Rajury phase shift key (BPSK) or frequency shift key (BFSK) modulation of the frequency modulated carrier signal. Using an experimental circuit operating at radio frequency band and a computer modeling we study the bit error rate (BER) performance in a noisy channel as well as multiuser capability of th
作者: itinerary    時間: 2025-3-31 02:57

作者: 詩集    時間: 2025-3-31 05:46





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
南京市| 乌苏市| 玉溪市| 卢湾区| 南召县| 昌江| 昭平县| 株洲市| 铁力市| 东丽区| 南靖县| 宜黄县| 涟水县| 乌什县| 宜州市| 沿河| 贡觉县| 宁南县| 常熟市| 永靖县| 辽阳市| 吉林市| 开封市| 弥渡县| 许昌县| 双辽市| 高尔夫| 镇平县| 贞丰县| 巴彦县| 城口县| 平顶山市| 楚雄市| 榆树市| 通化市| 建昌县| 璧山县| 延安市| 馆陶县| 浮梁县| 石屏县|