AXIOM 发表于 2025-3-23 12:16:58

Signals and Communication Technologyhttp://image.papertrans.cn/n/image/666780.jpg

defile 发表于 2025-3-23 16:19:57

http://reply.papertrans.cn/67/6668/666780/666780_12.png

Electrolysis 发表于 2025-3-23 18:20:11

http://reply.papertrans.cn/67/6668/666780/666780_13.png

审问,审讯 发表于 2025-3-24 00:12:37

http://reply.papertrans.cn/67/6668/666780/666780_14.png

FOLLY 发表于 2025-3-24 04:36:00

http://reply.papertrans.cn/67/6668/666780/666780_15.png

我们的面粉 发表于 2025-3-24 09:03:12

Wireless Communications,. The propagation models and fading are discussed further. These phenomena might result in the data to be corrupted in transit from source to sink; some mechanisms must be employed to counter the data corruption. Error concealment methods to counter the problem of data corruption are also discussed

Perceive 发表于 2025-3-24 13:22:42

http://reply.papertrans.cn/67/6668/666780/666780_17.png

大笑 发表于 2025-3-24 17:48:09

http://reply.papertrans.cn/67/6668/666780/666780_18.png

MERIT 发表于 2025-3-24 19:39:40

Dual Watermarking,atures to generate watermarks. The watermarking techniques discussed in this chapter are based on a combination of image features and forward error correction codes. It is shown how the ability of tolerance to modifications, location of modified positions and (partial) reconstruction of image is ach

大厅 发表于 2025-3-25 02:19:16

Enhanced Decoding Based on Authenticating the Region of Interests,In the first step only important parts of image are authenticated. The important parts are pre-marked regions of importance in the image such as the retina of an eye, number plate of a car. When the first phase succeeds, the second phase follows. In the second step, the successfully authenticated pr
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Noise Tolerant Data Authentication for Wireless Communication; Obaid Ur-Rehman,Natasa Zivic Book 2018 Springer International Publishing AG