![](images/graphics/blank.gif)
Data hiding
-
Lecture Object oriented programming - Lesson 5: Encapsulation, overloading and aggregation. Upon completion of this lesson, provides students with content including: encapsulation visibility scope, data hiding; Overloading principles, constructor overloading; Aggregation principles, order of initialization; Class usage any classes, Java classes;... Please refer to the detailed content of the lecture!
55p
codabach1016
03-05-2024
2
0
Download
-
This book is a reference guide for the parser generator ANTLR, ANother Tool for Language Recognition, and the tree-parser generator SORCERER, which is suited to source-to-source translation. SORCERER does not fit into the translator generator category perfectly because it translates trees, whereas the typical translator generator can only be used to translate text directly, thus hiding any intermediate steps or data structures from the programmer. The ANTLR and SORCERER team more closely supports what programmers would build by hand.
310p
longtimenosee05
31-03-2024
1
0
Download
-
Ebook Multimedia forensics & security - Part 1 includes contents: Chapter I: Authentication watermarkings for binary images; Chapter II: Secure multimedia content distribution based on watermarking technology; Chapter III: Digital watermarking in the transform domain with emphasis on SVD; Chapter IV: Digital video watermarking and the collusion attack; Chapter V: A survey of current watermarking synchronization techniq; Chapter VI: On the necessity of finding content before watermark retrieval: active search strategies for localising watermarked media on the internet; Chapter VII: Statistic...
183p
longtimenosee05
31-03-2024
3
0
Download
-
Reversible data hiding based on the preservation of sorted pixel value ordering (PVO) technique has been researched and expanded recently due to its high embedding capacity and good image quality. In this paper, to have more sub-blocks, the paper divides the image into sub-blocks with 3 pixels and embeds 2 bits in the maximum value and 1 bit in the minimum value.
9p
visystrom
22-11-2023
7
6
Download
-
This paper is a development of the iGePVO-K method by discarding the sequence of binary flags. That means it is not necessary to embed flags with the data in the original image. Therefore, the proposed method not only has a larger data embedding capacity but also has a better image quality than the methods mentioned above.
11p
visystrom
22-11-2023
6
5
Download
-
Pixel value ordering (PVO) has been considered as an effective reversible data hiding method for high embedding capacity and good imperceptibility. This paper proposes a novel reversible data hiding based on four sorted pixels for improving the conventional PVO method.
16p
vimulcahy
18-09-2023
6
5
Download
-
Reversible data hiding techniques for JPEG images have big challenges in order to improve the capacity, quality, and flexible embedding method. In this article, we propose a new crossdomain using combination of multiple quantization tables in JPEG algorithm.
13p
viengels
25-08-2023
11
4
Download
-
Ebook \(CE{H^{TM}}\) - Certified ethical hacker (Study Guide) - Part 1 presents the following content: Chapter 1: introduction to ethical hacking, ethics, and legality; chapter 2: gathering target information: reconnaissance, footprinting, and social engineering; chapter 3: gathering network and host information: scanning and enumeration; chapter 4: system hacking: password cracking, escalating privileges, and hiding files; chapter 5: trojans, backdoors, viruses, and worms; chapter 6: gathering data from networks: sniffers; chapter 7: denial of service and session hijacking; chapter 8: web ...
238p
runthenight08
12-04-2023
13
4
Download
-
Lecture Introduction to Programming: Lesson 27 provide students with knowledge about classes and objects; constructors; destructors; member functions; member data; function oriented; object oriented; multiple media; classes objects constructors; data hiding; function overloading;...
34p
hanthienngao
15-04-2022
15
1
Download
-
Lecture Introduction to Programming: Lesson 29 provide students with knowledge about private and public; encapsulation and data hiding; friend function; straight line; class quadratic; member function;...
20p
hanthienngao
15-04-2022
13
1
Download
-
Lecture Introduction to Programming: Lesson 40 provide students with knowledge about class; data hiding; public interface; initializer list; inside constructor for object row; structure inside a structure; class inside a class;...
28p
hanthienngao
15-04-2022
10
1
Download
-
This study can also prevent distortion drift. The experimental results show that the proposed algorithm can approximately recover to the original video. By comparing with the other studies, the proposed study further improves the embedding capacity, and can recover to the original video. A disadvantage of the algorithm is that it cannot correct the error bits for network attacks. So, in the future, we will use BCH code technique for robustness of data hiding with the proposed algorithm
7p
chauchaungayxua11
23-03-2021
10
2
Download
-
The algorithm uses a Complementary table with four values corresponding with data bits ‘00’, ‘01’, ‘10’, and ‘11’, so that, we can embed two bits for each nucleotide. Moreover, with four levels of Complementary values, the algorithm shows that the proposed method also improve the security for hidden data.
5p
chauchaungayxua11
23-03-2021
9
1
Download
-
This paper presents a new effective reversible data hiding method based on pixel-valueordering (iGePVO-K) which is improvement of a recent GePVO-K method that recently is considered as a PVO-used method having highest embedding capacity. In comparison with GePVO-K method, iGePVO-K has the following advantages. First, the embedding capacity of the new method is higher than that of GePVO-K method by using data embedding formulas reasonably and reducing the location map size.
20p
nguyenanhtuan_qb
18-06-2020
16
1
Download
-
In the past few years, privacy issues in data mining have received considerable attention in the data mining literature. However, the problem of data security cannot simply be solved by restricting data collection or against unauthorized access, it should be dealt with by providing solutions that not only protect sensitive information, but also not affect to the accuracy of the results in data mining and not violate the sensitive knowledge related with individual privacy or competitive advantage in businesses.
18p
12120609
23-03-2020
19
1
Download
-
In this paper, we present a new data hiding scheme (1,7,4) for grayscale images, where 7 is the number of pixels in each block of the image, 4 is the number of secret bits which can be hidden in each block with restriction that at most one pixel is changed, and the gray value is changed at most 3 from the original one.
9p
vititan2711
13-08-2019
10
1
Download
-
In this paper, we propose an adaptive algorithm for reversible data hiding by employing the characteristics and pyramidal relationships of original images. The major goal of reversible data hiding is to keep the reversibility of algorithm.
13p
vititan2711
13-08-2019
13
1
Download
-
In this paper, we proposed a new technique for reversible data hiding based on efficient compressed domain with multiple bit planes. We conducted a sequence of experiments to use block division scheme to appraise the result with different parameters and amended the probability of zero point in every block of histogram.
12p
vithanos2711
09-08-2019
19
3
Download
-
In this chapter you will learn: Encapsulation and data hiding, the notions of data abstraction and abstract data types (ADTs), to use keyword this, to use static variables and methods, to import static members of a class, to use the enum type to create sets of constants with unique identifiers, how to declare enum constants with parameters.
118p
shiwo_ding8
29-06-2019
52
1
Download
-
In this encryption technique, Users’ private keys and cipher texts are associated with a set of attributes. This technique completely encrypts the file and does not have any control over the individual attributes in the file. So, in order to overcome this problem a concept called attribute with weight was introduced, so that it can have control over the individual elements in the file and can be able to hide sensitive information while sharing data with the users
5p
hongnhan878
12-04-2019
23
0
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)