情爱 发表于 2025-3-28 16:58:38

Two-Stage Sequence-to-Sequence Neural Voice Conversion with Low-to-High Definition Spectrogram Mappi-cepstral distance (MCD) and Log F0 RMSE. Subjective evaluations revealed that the use of the proposed method had a certain effect in improving speech individuality while maintaining the same level of naturalness as the conventional method.

赞美者 发表于 2025-3-28 20:36:33

An Improved High-Capacity ECG Steganography with Smart Offset Coefficientsre is no need of using extra overhead for the intended receiver. Furthermore, the hidden message can be designed on-demand with various size. Experimental results indicated that the average SNR of the proposed method is larger than that of the Yang and Wang’s scheme about 3.54 dB. The proposed metho

Friction 发表于 2025-3-29 00:45:44

Preview-Versioned Essential Secret Image Sharing− .) non-essential shadows. When receiving at least . shadows containing at least . essential shadows, the secret image can be lossless revealed. In this paper, a preview-versioned style essential secret image sharing is proposed. When receiving at least . essential shadows, a previewed version of s

欲望 发表于 2025-3-29 03:55:44

Visual Cryptography with QR-Code Transparencies meaningful, they are just with rough look of a meaningful picture. In this paper, the encoded transparencies are also QR-codes that can be decoded by common QR-code scanner that can be ained in mobile phone. Therefore, people can get more information of this transparencies by scanning the QR-code t

dialect 发表于 2025-3-29 08:48:58

Solving the Multiple Charging Vehicles Scheduling Problem for Wireless Rechargeable Sensor Networksloading of each sensor is different, sensors request for charging in different frequencies. Also, sensors may deplete their energy quickly and need to be charged urgently under some circumstances. Therefore, a good charging route should not only minimize the moving distance of the charging device t

细菌等 发表于 2025-3-29 13:43:25

An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Functionproposes a steganography algorithm based on pixel block difference and variable modulus function (PVBD). The algorithm uses the modular function of dynamic parameters to optimize the amplitude of the pixel value modification, and at the same time the related parameters of the mode function are dynam

covert 发表于 2025-3-29 17:39:49

Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Logge of fuzzy clustering to describe the similarity between security logs and the advantage of sequence pattern to describe the logical relationship in attacking steps. The experimental results show that the algorithm can effectively mine the attack pattern, improve the accuracy and generate more effe

Mast-Cell 发表于 2025-3-29 21:20:35

http://reply.papertrans.cn/83/8228/822797/822797_48.png

EVICT 发表于 2025-3-30 02:13:46

http://reply.papertrans.cn/83/8228/822797/822797_49.png

SPECT 发表于 2025-3-30 04:53:44

Muting Machine Speech Using Audio Watermarkingkers are in the same environment, in which a dialog system misdetects the other dialog systems voice as a users voice. In this paper, a method to mute synthesized speech is proposed to prevent a speech recognizer from recognizing speech uttered by a machine. The audio watermark technique is used to
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing; Proceeding of the Fo Jeng-Shyang Pan,Akinori Ito,Lakhmi