Found: 20
Select item for more details and to access through your institution.
Removable visible image watermarking algorithm in the discrete cosine transform domain.
- Published in:
- Journal of Electronic Imaging, 2008, v. 17, n. 3, p. 33008, doi. 10.1117/1.2952843
- By:
- Publication type:
- Article
A Robust Image Watermarking Based on Image Restoration Using SIFT.
- Published in:
- Radioengineering, 2011, v. 20, n. 2, p. 525
- By:
- Publication type:
- Article
Lossless Authentication Watermarking Based on Adaptive Modular Arithmetic.
- Published in:
- Radioengineering, 2010, v. 19, n. 1, p. 52
- By:
- Publication type:
- Article
A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution.
- Published in:
- Radioengineering, 2009, v. 18, n. 4, p. 509
- By:
- Publication type:
- Article
An Improved Metalearning Framework to Optimize Bearing Fault Diagnosis under Data Imbalance.
- Published in:
- Journal of Sensors, 2022, v. 2022, p. 1, doi. 10.1155/2022/1809482
- By:
- Publication type:
- Article
Software Information Hiding Algorithm Based on Palette Icon of PE File.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 33, n. 1, p. 133, doi. 10.32604/iasc.2022.024494
- By:
- Publication type:
- Article
Code fusion information-hiding algorithm based on PE file function migration.
- Published in:
- EURASIP Journal on Image & Video Processing, 2021, v. 2021, n. 1, p. 1, doi. 10.1186/s13640-020-00541-3
- By:
- Publication type:
- Article
Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 11, p. 13301, doi. 10.1007/s11042-016-3757-8
- By:
- Publication type:
- Article
A secure removable visible watermarking for BTC compressed images.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 6, p. 1725, doi. 10.1007/s11042-013-1714-3
- By:
- Publication type:
- Article
The Review of Secret Image Sharing.
- Published in:
- Journal of New Media, 2023, v. 5, n. 1, p. 45, doi. 10.32604/jnm.2023.039962
- By:
- Publication type:
- Article
Camouflage Design by Combining Region Growing and Color Similarity.
- Published in:
- Telecommunication Engineering, 2015, v. 55, n. 4, p. 453, doi. 10.3969/j.issn.1001-893x.2015.04.018
- By:
- Publication type:
- Article
Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing.
- Published in:
- Journal of Information Processing Systems, 2023, v. 19, n. 6, p. 756, doi. 10.3745/JIPS.03.0189
- By:
- Publication type:
- Article
Enhanced compound-protein binding affinity prediction by representing protein multimodal information via a coevolutionary strategy.
- Published in:
- Briefings in Bioinformatics, 2023, v. 24, n. 2, p. 1, doi. 10.1093/bib/bbac628
- By:
- Publication type:
- Article
Perceptual Image Hashing Using Latent Low-Rank Representation and Uniform LBP.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 2, p. 317, doi. 10.3390/app8020317
- By:
- Publication type:
- Article
Adaptive Reversible Visible Watermarking Based on Total Variation for BTC-Compressed Images.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 3, p. 5173, doi. 10.32604/cmc.2023.034819
- By:
- Publication type:
- Article
Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation.
- Published in:
- Entropy, 2023, v. 25, n. 11, p. 1516, doi. 10.3390/e25111516
- By:
- Publication type:
- Article
A Secure Rotation Invariant LBP Feature Computation in Cloud Environment.
- Published in:
- Computers, Materials & Continua, 2021, v. 68, n. 3, p. 2979, doi. 10.32604/cmc.2021.017094
- By:
- Publication type:
- Article
A Method of Obtaining Catchment Basins with Contour Lines for Foam Image Segmentation.
- Published in:
- Computers, Materials & Continua, 2019, v. 60, n. 3, p. 1155, doi. 10.32604/cmc.2019.06123
- By:
- Publication type:
- Article
Verification Grid and Map Slipping Based Graphical Password against Shoulder-Surfing Attacks.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6778755
- By:
- Publication type:
- Article
Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic–Chebyshev Coupled Map.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 8, p. 456, doi. 10.3390/info14080456
- By:
- Publication type:
- Article