Found: 26
Select item for more details and to access through your institution.
High-Capacity Embedding Method Based on Double-Layer Octagon-Shaped Shell Matrix.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 4, p. 583, doi. 10.3390/sym13040583
- By:
- Publication type:
- Article
PVO-Based Reversible Data Hiding Exploiting Two-Layer Embedding for Enhancing Image Fidelity.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 7, p. 1164, doi. 10.3390/sym12071164
- By:
- Publication type:
- Article
A Robust and Removable Watermarking Scheme Using Singular Value Decomposition.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 12, p. 5268, doi. 10.3837/tiis.2016.12.008
- By:
- Publication type:
- Article
A self-embedding fragile image authentication based on singular value decomposition.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 35/36, p. 25969, doi. 10.1007/s11042-020-09254-1
- By:
- Publication type:
- Article
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 7, p. 9993, doi. 10.1007/s11042-016-3591-z
- By:
- Publication type:
- Article
An Internet-of-Things-based Sensing Rural Medical Care System.
- Published in:
- Sensors & Materials, 2019, v. 31, n. 3, Part 3, p. 1037, doi. 10.18494/SAM.2019.2227
- By:
- Publication type:
- Article
Image Authentication and Restoration Using Block-Wise Variational Automatic Encoding and Generative Adversarial Networks.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 16, p. 3402, doi. 10.3390/electronics12163402
- By:
- Publication type:
- Article
Server-less RFID authentication and searching protocol with enhanced security.
- Published in:
- International Journal of Communication Systems, 2012, v. 25, n. 3, p. 376, doi. 10.1002/dac.1246
- By:
- Publication type:
- Article
TGF-β inhibits prolactin-induced expression of β-casein by a Smad3-dependent mechanism.
- Published in:
- Journal of Cellular Biochemistry, 2008, v. 104, n. 5, p. 1647, doi. 10.1002/jcb.21734
- By:
- Publication type:
- Article
Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2019, v. 23, n. 19, p. 9719, doi. 10.1007/s00500-018-3537-7
- By:
- Publication type:
- Article
Design of a Logistics System with Privacy and Lightweight Verification.
- Published in:
- Energies (19961073), 2019, v. 12, n. 16, p. 3061, doi. 10.3390/en12163061
- By:
- Publication type:
- Article
A data mining approach to database compression.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 3, p. 147, doi. 10.1007/s10796-006-8777-x
- By:
- Publication type:
- Article
A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images.
- Published in:
- KSII Transactions on Internet & Information Systems, 2020, v. 14, n. 6, p. 2554, doi. 10.3837/tiis.2020.06.013
- By:
- Publication type:
- Article
Efficient Associating Mining Approaches for Compressing Incrementally Updatable Native XML Databases.
- Published in:
- IAENG International Journal of Computer Science, 2007, v. 33, n. 1, p. 78
- By:
- Publication type:
- Article
Two RFID-based Solutions to Enhance Inpatient Medication Safety.
- Published in:
- Journal of Medical Systems, 2011, v. 35, n. 3, p. 369, doi. 10.1007/s10916-009-9373-7
- By:
- Publication type:
- Article
A Hierarchical Fragile Watermarking with VQ Index Recovery.
- Published in:
- Journal of Multimedia, 2011, v. 6, n. 3, p. 277, doi. 10.4304/jmm.6.3.277-284
- By:
- Publication type:
- Article
Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 10, p. 2267, doi. 10.3390/s19102267
- By:
- Publication type:
- Article
High-Capacity and High-Quality Reversible Data Hiding Method Using Recurrent Round-Trip Embedding Strategy in the Quotient Image.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 21, p. 10157, doi. 10.3390/app112110157
- By:
- Publication type:
- Article
Predicting Network Behavior Model of E-Learning Partner Program in PLS-SEM.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 13, p. 4656, doi. 10.3390/app10134656
- By:
- Publication type:
- Article
A generalized pixel value ordering data hiding with adaptive embedding capability.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 4, p. 2683, doi. 10.1007/s11227-019-03052-9
- By:
- Publication type:
- Article
Image interpolating based data hiding in conjunction with pixel-shifting of histogram.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 1093, doi. 10.1007/s11227-013-1016-6
- By:
- Publication type:
- Article
Spatial match retrieval based on direction signatures using multiple key hashing scheme.
- Published in:
- International Journal of Intelligent Systems, 1997, v. 12, n. 10, p. 777, doi. 10.1002/(SICI)1098-111X(199710)12:10<777::AID-INT6>3.0.CO;2-V
- By:
- Publication type:
- Article
Reversible data hiding scheme based on dual stegano-images using orientation combinations.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 4, p. 2237, doi. 10.1007/s11235-011-9529-x
- By:
- Publication type:
- Article
Improved Dual-image Quality with Reversible Data Hiding Using Translocation and Switching Strategy.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 44, n. 2, p. 1551, doi. 10.32604/csse.2023.026294
- By:
- Publication type:
- Article
Inquiring the Most Critical Teacher's Technology Education Competences in the Highest Efficient Technology Education Learning Organization.
- Published in:
- Eurasia Journal of Mathematics, Science & Technology Education, 2017, v. 13, n. 6, p. 2645, doi. 10.12973/eurasia.2017.01245a
- By:
- Publication type:
- Article
Steganographic access control in data hiding using run-length encoding and modulo-operations.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 2, p. 139, doi. 10.1002/sec.333
- By:
- Publication type:
- Article