Found: 22
Select item for more details and to access through your institution.
A robust reversible data hiding scheme for color image using reed-solomon code.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 17, p. 24903, doi. 10.1007/s11042-019-7626-0
- By:
- Publication type:
- Article
Directional PVO for reversible data hiding scheme with image interpolation.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 23, p. 31281, doi. 10.1007/s11042-018-6203-2
- By:
- Publication type:
- Article
Weighted matrix based reversible watermarking scheme using color image.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 18, p. 23073, doi. 10.1007/s11042-017-5568-y
- By:
- Publication type:
- Article
Reversible data hiding scheme using sub-sampled image exploiting Lagrange’s interpolating polynomial.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 7, p. 8805, doi. 10.1007/s11042-017-4775-x
- By:
- Publication type:
- Article
Dual image based reversible data hiding scheme using (7,4) hamming code.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 1, p. 763, doi. 10.1007/s11042-016-4230-4
- By:
- Publication type:
- Article
Partial reversible data hiding scheme using (7, 4) hamming code.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 20, p. 21691, doi. 10.1007/s11042-016-3990-1
- By:
- Publication type:
- Article
Application of Type-2 Defuzzification Method to Solve Profit Maximization Solid Transportation Problem Considering Carbon Emission.
- Published in:
- International Journal of Information & Management Sciences, 2023, v. 34, n. 2, p. 99, doi. 10.6186/IJIMS.20230634(2).0001
- By:
- Publication type:
- Article
A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion.
- Published in:
- International Journal of Natural Computing Research, 2019, v. 8, n. 4, p. N.PAG, doi. 10.4018/IJNCR.2019100102
- By:
- Publication type:
- Article
Robust watermarking scheme for tamper detection and authentication exploiting CA.
- Published in:
- IET Image Processing (Wiley-Blackwell), 2019, v. 13, n. 12, p. 2116, doi. 10.1049/iet-ipr.2018.6638
- By:
- Publication type:
- Article
Aspect based sentiment analysis using multi‐criteria decision‐making and deep learning under COVID‐19 pandemic in India.
- Published in:
- CAAI Transactions on Intelligence Technology, 2023, v. 8, n. 1, p. 219, doi. 10.1049/cit2.12144
- By:
- Publication type:
- Article
Constrained FC 4D MITPs for Damageable Substitutable and Complementary Items in Rough Environments.
- Published in:
- Mathematics (2227-7390), 2019, v. 7, n. 3, p. 281, doi. 10.3390/math7030281
- By:
- Publication type:
- Article
Active Queue Management in RED Considering Critical Point on Target Queue.
- Published in:
- Journal of Interconnection Networks, 2021, v. 21, n. 3, p. 1, doi. 10.1142/S0219265921500171
- By:
- Publication type:
- Article
Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image.
- Published in:
- Security & Privacy, 2019, v. 2, n. 2, p. N.PAG, doi. 10.1002/spy2.59
- By:
- Publication type:
- Article
Improving the Reversible LSB Matching Scheme Based on the Likelihood Re-Encoding Strategy.
- Published in:
- Entropy, 2021, v. 23, n. 5, p. 577, doi. 10.3390/e23050577
- By:
- Publication type:
- Article
APPLICATION OF FUZZY PROGRAMMING TECHNIQUES TO SOLVE SOLID TRANSPORTATION PROBLEM WITH ADDITIONAL CONSTRAINTS.
- Published in:
- Operations Research & Decisions, 2020, v. 30, n. 1, p. 67, doi. 10.37190/ord200104
- By:
- Publication type:
- Article
Fuzzy proximity-based robust data hiding scheme with interval threshold.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2023, v. 27, n. 7, p. 4011, doi. 10.1007/s00500-022-07552-4
- By:
- Publication type:
- Article
An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting Code.
- Published in:
- Wireless Personal Communications, 2021, v. 121, n. 1, p. 939, doi. 10.1007/s11277-021-08666-y
- By:
- Publication type:
- Article
Reversible data hiding strategy exploiting circular distance interpolation utilizing optimal pixel adjustment with error substitution.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 16, p. 48949, doi. 10.1007/s11042-023-17014-0
- By:
- Publication type:
- Article
Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 6, p. 16895, doi. 10.1007/s11042-023-16171-6
- By:
- Publication type:
- Article
Robust data hiding scheme for highly compressed image exploiting btc with hamming code.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 3, p. 8591, doi. 10.1007/s11042-023-15727-w
- By:
- Publication type:
- Article
A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 14, p. 21651, doi. 10.1007/s11042-021-10651-3
- By:
- Publication type:
- Article
Improved center-folding based directional pixel value ordering for reversible data hiding scheme.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 4, p. 5617, doi. 10.1007/s11042-020-09823-4
- By:
- Publication type:
- Article