找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Advances in Intelligent Information Hiding and Multimedia Signal Processing; Proceeding of the II Jeng-Shyang Pan,Zhenyu Meng,Maria Virvou

[复制链接]
楼主: JAR
发表于 2025-3-28 16:13:45 | 显示全部楼层
Antony Lewis,Anthony Lasenby,Chris Doranstored. In the proposed scheme, the reconstructed secret image has the same size as the original secret image. There is no pixel expansion. The scheme extends the progressive visual secret sharing (PVSS) to the quantum framework, and the experimental results verify the effectiveness and feasibility of the scheme.
发表于 2025-3-28 20:04:57 | 显示全部楼层
On ,-Deformations of Clifford Algebrasion mechanism which takes the surrounding valid values as the auxiliary information to focus on the process of depth hole-filling from edge to center. The proposed method achieves competitive performance on existing public datasets.
发表于 2025-3-29 02:35:54 | 显示全部楼层
Rafał Abłamowicz,Pertti Lounestoults with the previous methods show that the proposed method with EHSA produces total power generation higher and the calculation time faster convergence speed, respectively, than other competitive methods. The proposed method provides a feasible way to solve the optimal dispatching model of cascade reservoir planning in power generation.
发表于 2025-3-29 06:47:58 | 显示全部楼层
https://doi.org/10.1007/978-981-19-1053-1Information Hiding; Multimedia; Signal Processing; IIH-MSP 2021 Proceedings; Network Security; Big Data; C
发表于 2025-3-29 07:55:33 | 显示全部楼层
发表于 2025-3-29 12:12:14 | 显示全部楼层
Jeng-Shyang Pan,Zhenyu Meng,Maria VirvouPresents recent innovative research in the field of information technology.Discusses the outcomes of IIHMSP 2021, held in Kaohsiung, Taiwan.Serves as a reference resource for researchers and practitio
发表于 2025-3-29 15:59:49 | 显示全部楼层
发表于 2025-3-29 23:22:58 | 显示全部楼层
发表于 2025-3-30 03:38:25 | 显示全部楼层
https://doi.org/10.1007/978-94-015-8090-8fingerprints extracted from audio recordings along with the time stamp data are embedded into audio recordings as watermarks for tamper detection. The decoder uses fingerprints extracted from the audio recording itself to detect tampering. The vector distance between fingerprints obtained from the w
发表于 2025-3-30 07:31:48 | 显示全部楼层
J. S. R. Chisholm,R. S. FarwellPHR) generated by the wearable devices in IoMT has become more and more important for the diagnosis and treatment of patients. A PHR sharing model based on Tangle and proxy re-encryption (PRE) is proposed in this paper. In the model, the PHR hash and operation log are stored in the Tangle, and the P
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-18 19:28
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表