標(biāo)題: Titlebook: Intelligent Techniques in Signal Processing for Multimedia Security; Nilanjan Dey,V. Santhi Book 2017 Springer International Publishing Sw [打印本頁] 作者: Alacrity 時間: 2025-3-21 16:22
書目名稱Intelligent Techniques in Signal Processing for Multimedia Security影響因子(影響力)
書目名稱Intelligent Techniques in Signal Processing for Multimedia Security影響因子(影響力)學(xué)科排名
書目名稱Intelligent Techniques in Signal Processing for Multimedia Security網(wǎng)絡(luò)公開度
書目名稱Intelligent Techniques in Signal Processing for Multimedia Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Intelligent Techniques in Signal Processing for Multimedia Security被引頻次
書目名稱Intelligent Techniques in Signal Processing for Multimedia Security被引頻次學(xué)科排名
書目名稱Intelligent Techniques in Signal Processing for Multimedia Security年度引用
書目名稱Intelligent Techniques in Signal Processing for Multimedia Security年度引用學(xué)科排名
書目名稱Intelligent Techniques in Signal Processing for Multimedia Security讀者反饋
書目名稱Intelligent Techniques in Signal Processing for Multimedia Security讀者反饋學(xué)科排名
作者: Ceremony 時間: 2025-3-21 20:21 作者: foodstuff 時間: 2025-3-22 00:55 作者: 心胸狹窄 時間: 2025-3-22 06:21
Information Hiding: Steganographyre the data, the appearance of encrypted images and video streams makes them vulnerable to attacks. This situation can be disastrous in cases where security and privacy are of utmost importance, such as in military, medical, or covert applications. This drawback of cryptography is one of the many fa作者: Peculate 時間: 2025-3-22 09:34
Digital Watermarking: A Potential Solution for Multimedia Authenticationation of the intellectual artifact. The combining, replication, and distribution facility of the digital media such as text, images, audio, and video easier and faster has no doubt revolutionized the world. However, the unauthorized use and maldistribution of information by online pirates is the sol作者: 離開就切除 時間: 2025-3-22 13:33 作者: 羊欄 時間: 2025-3-22 20:29
Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decompositiog techniques was introduced. However, several popular watermarking techniques consume much more time to embed and extract the hidden message. In this current work, a randomized singular value decomposition (rSVD)-based watermarking technique has been proposed in order to avoid such problems. In this作者: 妨礙 時間: 2025-3-23 00:48 作者: 切掉 時間: 2025-3-23 04:25
Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in g (OFDM) is the most reliable modulation technique which has been adopted. To reduce the redundancy, storage requirements, and communication costs and to protect our data from eavesdropping, data compression algorithms are used. With the increasing demand of secure multimedia, there is a need to dev作者: debble 時間: 2025-3-23 06:22
Hand Image Biometric Based Personal Authentication Systemrong resistance against the unauthorized access and easy to use modality from the user point of view. This chapter presents an approach for the personal authentication using geometrical structure of hand images. The proposed approach consists of many phases like acquisition of hand images of the use作者: 豐滿中國 時間: 2025-3-23 10:42 作者: padding 時間: 2025-3-23 16:50
Face Recognition Under Dry and Wet Face Conditionsvely. However, none of the works has made an attempt to address a special case of traditional face recognition, i.e., face recognition under dry and wet face conditions. Here, the gallery face is supposed to be dry face and the probe is a wet face, which comes into picture if the face recognition is作者: 瘙癢 時間: 2025-3-23 19:19
Improved Approach for 3D Face Characterizationization, expression recognition, human–computer interaction and face tracking. We are interested in the extraction of the pertinent features in 3D face. In this paper, we propose an improved algorithm for 3D face characterization. We propose novel characteristics based on seven salient points of the作者: PHON 時間: 2025-3-24 00:17
Attendance Recording System Using Partial Face Recognition Algorithmded in the maintenance and management of the traditional attendance sheets is tedious as it costs quite a time for the lecturer. Thus, there is a requirement for robust computerized biometric-based attendance recording system (ARS). Face recognition-based methods are a potential replacement for conv作者: Osteoarthritis 時間: 2025-3-24 02:43
Automatic Human Emotion Recognition in Surveillance Videomputer vision. The recognition of complete-body expressions is significantly harder, because the pattern of the human pose has additional degrees of self-determination than the face alone, and its overall shape varies robustly during articulated motion. This chapter presents a method for emotion rec作者: Dorsal-Kyphosis 時間: 2025-3-24 08:39 作者: 朋黨派系 時間: 2025-3-24 12:36 作者: 美學(xué) 時間: 2025-3-24 17:44
nctions (VNF) to be executed according to a given order. The running of VNFs needs the instantiation of VNF Instances (VNFIs) that are software modules executed on Virtual Machines. In this paper we cope with the migration problem of the VNFIs needed in the low traffic periods to switch off servers 作者: 震驚 時間: 2025-3-24 19:50 作者: 不適當(dāng) 時間: 2025-3-24 23:52 作者: Antagonism 時間: 2025-3-25 05:21
Anant M. Bagade,Sanjay N. Talbartal sytems.Reinforces basic principles with worked examples This book develops the concepts for the transmission of digital information sequences through analog, band limited channels, including the topics of pulse shaping, channels with amplitude and delay distortion, eye patterns, zero forcing and作者: Transfusion 時間: 2025-3-25 09:12 作者: Palpate 時間: 2025-3-25 13:09
Kaiser J. Giri,Rumaan Bashir for chaotic optical communications. Basic concepts and theoretical framework are reviewed. Experimental results are presented to demonstrate the fundamental concepts. Numerical computations are employed for mapping the dynamical states and for illustrating certain detailed characteristics of the ch作者: Expressly 時間: 2025-3-25 17:06 作者: maverick 時間: 2025-3-25 23:49
Sayan Chakraborty,Souvik Chatterjee,Nilanjan Dey,Amira S. Ashour,Aboul Ella Hassaniena which characterize and constitute a worldly perspective that is somehow distinct from that of the foreign world views that have influenced African peoples), this chapter aims to fill a major gap in the study of digital communication. It does so by discussing the Ancient Kemetian/Egyptian genesis o作者: guzzle 時間: 2025-3-26 01:27 作者: miscreant 時間: 2025-3-26 05:01 作者: 詩集 時間: 2025-3-26 10:54 作者: Headstrong 時間: 2025-3-26 14:17
Ravinder Kumarveral years due to the demand for processors that are smaller, faster, and dissipate less power. Unfortunately, this means that many of these datapaths will be complex both algorithmically and circuit- wise. As the complexity of the chips increases, less importance will be placed on understanding ho作者: Germinate 時間: 2025-3-26 20:47
M. Sivarathinabala,S. Abirami,R. Baskaranol engineering. This role has in fact grown in importance over the years because of the increasing complexities of the control tasks considered. These tasks required the corresponding increases which have occurred in the sophistication of the computing hardware, design methods and software tools ava作者: 規(guī)范就好 時間: 2025-3-26 21:22 作者: ARENA 時間: 2025-3-27 04:48 作者: 暫時過來 時間: 2025-3-27 07:27 作者: 具體 時間: 2025-3-27 11:22 作者: 消滅 時間: 2025-3-27 17:11
Intelligent Morphing and Steganography Techniques for Multimedia Securitynt morphing and steganography techniques. Hybrid approaches using morphing for steganography have a special status among steganographic systems as they combine both the features of morphing and steganography to overcome the shortcomings of individual methods.作者: 刺耳 時間: 2025-3-27 19:54 作者: 合法 時間: 2025-3-27 23:18 作者: Oratory 時間: 2025-3-28 06:08 作者: 傾聽 時間: 2025-3-28 06:23
Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decompositio work, firstly, the watermark is embedded into the cover image using singular value decomposition, and then the rSVD is employed. Finally, the obtained results were compared to check the time complexity of both methods and to compare the quality of watermarked image and recovered watermarks.作者: Urgency 時間: 2025-3-28 14:12
Security of Multimedia Contents: A Brieff overview of the multimedia security problem in the prevailing research work in the various applications. It provided evolution of the different hiding techniques along with their properties and requirements. Finally, some challenges are addressed for future research direction.作者: 沒有貧窮 時間: 2025-3-28 17:13 作者: 現(xiàn)暈光 時間: 2025-3-28 21:42 作者: deface 時間: 2025-3-29 00:58 作者: 受人支配 時間: 2025-3-29 04:33 作者: 微生物 時間: 2025-3-29 09:04
Book 2017umerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern作者: RENAL 時間: 2025-3-29 13:43 作者: 整頓 時間: 2025-3-29 18:25 作者: 致詞 時間: 2025-3-29 20:40
Ravinder Kumar as designs are getting more complex less understanding is going into a particular implementation because it can be generated automati- cally. Although software tools are a highly valuable asse978-1-4613-4725-5978-1-4419-8931-4作者: harmony 時間: 2025-3-30 03:10
d how to migrate VNFI in response to changes to SFC request intensity and location. The objective is to minimize the total energy consumption given by the sum of the consolidation and migration energies. The obtained results show how the policies allows for a lower energy consumption with respect to作者: Mutter 時間: 2025-3-30 04:57
d how to migrate VNFI in response to changes to SFC request intensity and location. The objective is to minimize the total energy consumption given by the sum of the consolidation and migration energies. The obtained results show how the policies allows for a lower energy consumption with respect to作者: HUMP 時間: 2025-3-30 10:10 作者: 誤傳 時間: 2025-3-30 13:21 作者: ANTH 時間: 2025-3-30 18:06 作者: 外科醫(yī)生 時間: 2025-3-30 22:51
H. R. Lakshmi,B. Surekha,S. Viswanadha Rajury phase shift key (BPSK) or frequency shift key (BFSK) modulation of the frequency modulated carrier signal. Using an experimental circuit operating at radio frequency band and a computer modeling we study the bit error rate (BER) performance in a noisy channel as well as multiuser capability of th作者: itinerary 時間: 2025-3-31 02:57 作者: 詩集 時間: 2025-3-31 05:46