intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Data hiding

Xem 1-20 trên 55 kết quả Data hiding
  • Lecture Object oriented programming - Lesson 5: Encapsulation, overloading and aggregation. Upon completion of this lesson, provides students with content including: encapsulation visibility scope, data hiding; Overloading principles, constructor overloading; Aggregation principles, order of initialization; Class usage any classes, Java classes;... Please refer to the detailed content of the lecture!

    pdf55p codabach1016 03-05-2024 2 0   Download

  • This book is a reference guide for the parser generator ANTLR, ANother Tool for Language Recognition, and the tree-parser generator SORCERER, which is suited to source-to-source translation. SORCERER does not fit into the translator generator category perfectly because it translates trees, whereas the typical translator generator can only be used to translate text directly, thus hiding any intermediate steps or data structures from the programmer. The ANTLR and SORCERER team more closely supports what programmers would build by hand.

    pdf310p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Multimedia forensics & security - Part 1 includes contents: Chapter I: Authentication watermarkings for binary images; Chapter II: Secure multimedia content distribution based on watermarking technology; Chapter III: Digital watermarking in the transform domain with emphasis on SVD; Chapter IV: Digital video watermarking and the collusion attack; Chapter V: A survey of current watermarking synchronization techniq; Chapter VI: On the necessity of finding content before watermark retrieval: active search strategies for localising watermarked media on the internet; Chapter VII: Statistic...

    pdf183p longtimenosee05 31-03-2024 3 0   Download

  • Reversible data hiding based on the preservation of sorted pixel value ordering (PVO) technique has been researched and expanded recently due to its high embedding capacity and good image quality. In this paper, to have more sub-blocks, the paper divides the image into sub-blocks with 3 pixels and embeds 2 bits in the maximum value and 1 bit in the minimum value.

    pdf9p visystrom 22-11-2023 7 6   Download

  • This paper is a development of the iGePVO-K method by discarding the sequence of binary flags. That means it is not necessary to embed flags with the data in the original image. Therefore, the proposed method not only has a larger data embedding capacity but also has a better image quality than the methods mentioned above.

    pdf11p visystrom 22-11-2023 6 5   Download

  • Pixel value ordering (PVO) has been considered as an effective reversible data hiding method for high embedding capacity and good imperceptibility. This paper proposes a novel reversible data hiding based on four sorted pixels for improving the conventional PVO method.

    pdf16p vimulcahy 18-09-2023 6 5   Download

  • Reversible data hiding techniques for JPEG images have big challenges in order to improve the capacity, quality, and flexible embedding method. In this article, we propose a new cross­domain using combination of multiple quantization tables in JPEG algorithm.

    pdf13p viengels 25-08-2023 11 4   Download

  • Ebook \(CE{H^{TM}}\) - Certified ethical hacker (Study Guide) - Part 1 presents the following content: Chapter 1: introduction to ethical hacking, ethics, and legality; chapter 2: gathering target information: reconnaissance, footprinting, and social engineering; chapter 3: gathering network and host information: scanning and enumeration; chapter 4: system hacking: password cracking, escalating privileges, and hiding files; chapter 5: trojans, backdoors, viruses, and worms; chapter 6: gathering data from networks: sniffers; chapter 7: denial of service and session hijacking; chapter 8: web ...

    pdf238p runthenight08 12-04-2023 13 4   Download

  • Lecture Introduction to Programming: Lesson 27 provide students with knowledge about classes and objects; constructors; destructors; member functions; member data; function oriented; object oriented; multiple media; classes objects constructors; data hiding; function overloading;...

    ppt34p hanthienngao 15-04-2022 15 1   Download

  • Lecture Introduction to Programming: Lesson 29 provide students with knowledge about private and public; encapsulation and data hiding; friend function; straight line; class quadratic; member function;...

    ppt20p hanthienngao 15-04-2022 13 1   Download

  • Lecture Introduction to Programming: Lesson 40 provide students with knowledge about class; data hiding; public interface; initializer list; inside constructor for object row; structure inside a structure; class inside a class;...

    ppt28p hanthienngao 15-04-2022 10 1   Download

  • This study can also prevent distortion drift. The experimental results show that the proposed algorithm can approximately recover to the original video. By comparing with the other studies, the proposed study further improves the embedding capacity, and can recover to the original video. A disadvantage of the algorithm is that it cannot correct the error bits for network attacks. So, in the future, we will use BCH code technique for robustness of data hiding with the proposed algorithm

    pdf7p chauchaungayxua11 23-03-2021 10 2   Download

  • The algorithm uses a Complementary table with four values corresponding with data bits ‘00’, ‘01’, ‘10’, and ‘11’, so that, we can embed two bits for each nucleotide. Moreover, with four levels of Complementary values, the algorithm shows that the proposed method also improve the security for hidden data.

    pdf5p chauchaungayxua11 23-03-2021 9 1   Download

  • This paper presents a new effective reversible data hiding method based on pixel-valueordering (iGePVO-K) which is improvement of a recent GePVO-K method that recently is considered as a PVO-used method having highest embedding capacity. In comparison with GePVO-K method, iGePVO-K has the following advantages. First, the embedding capacity of the new method is higher than that of GePVO-K method by using data embedding formulas reasonably and reducing the location map size.

    pdf20p nguyenanhtuan_qb 18-06-2020 16 1   Download

  • In the past few years, privacy issues in data mining have received considerable attention in the data mining literature. However, the problem of data security cannot simply be solved by restricting data collection or against unauthorized access, it should be dealt with by providing solutions that not only protect sensitive information, but also not affect to the accuracy of the results in data mining and not violate the sensitive knowledge related with individual privacy or competitive advantage in businesses.

    pdf18p 12120609 23-03-2020 19 1   Download

  • In this paper, we present a new data hiding scheme (1,7,4) for grayscale images, where 7 is the number of pixels in each block of the image, 4 is the number of secret bits which can be hidden in each block with restriction that at most one pixel is changed, and the gray value is changed at most 3 from the original one.

    pdf9p vititan2711 13-08-2019 10 1   Download

  • In this paper, we propose an adaptive algorithm for reversible data hiding by employing the characteristics and pyramidal relationships of original images. The major goal of reversible data hiding is to keep the reversibility of algorithm.

    pdf13p vititan2711 13-08-2019 13 1   Download

  • In this paper, we proposed a new technique for reversible data hiding based on efficient compressed domain with multiple bit planes. We conducted a sequence of experiments to use block division scheme to appraise the result with different parameters and amended the probability of zero point in every block of histogram.

    pdf12p vithanos2711 09-08-2019 19 3   Download

  • In this chapter you will learn: Encapsulation and data hiding, the notions of data abstraction and abstract data types (ADTs), to use keyword this, to use static variables and methods, to import static members of a class, to use the enum type to create sets of constants with unique identifiers, how to declare enum constants with parameters.

    ppt118p shiwo_ding8 29-06-2019 52 1   Download

  • In this encryption technique, Users’ private keys and cipher texts are associated with a set of attributes. This technique completely encrypts the file and does not have any control over the individual attributes in the file. So, in order to overcome this problem a concept called attribute with weight was introduced, so that it can have control over the individual elements in the file and can be able to hide sensitive information while sharing data with the users

    pdf5p hongnhan878 12-04-2019 23 0   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
320 tài liệu
1226 lượt tải
207 tài liệu
1444 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2