找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing; Proceeding of the Fo Jeng-Shyang Pan,Akinori Ito,Lakhmi

[复制链接]
楼主: 使固定
发表于 2025-3-28 16:58:38 | 显示全部楼层
Two-Stage Sequence-to-Sequence Neural Voice Conversion with Low-to-High Definition Spectrogram Mappi-cepstral distance (MCD) and Log F0 RMSE. Subjective evaluations revealed that the use of the proposed method had a certain effect in improving speech individuality while maintaining the same level of naturalness as the conventional method.
发表于 2025-3-28 20:36:33 | 显示全部楼层
An Improved High-Capacity ECG Steganography with Smart Offset Coefficientsre is no need of using extra overhead for the intended receiver. Furthermore, the hidden message can be designed on-demand with various size. Experimental results indicated that the average SNR of the proposed method is larger than that of the Yang and Wang’s scheme about 3.54 dB. The proposed metho
发表于 2025-3-29 00:45:44 | 显示全部楼层
Preview-Versioned Essential Secret Image Sharing− .) non-essential shadows. When receiving at least . shadows containing at least . essential shadows, the secret image can be lossless revealed. In this paper, a preview-versioned style essential secret image sharing is proposed. When receiving at least . essential shadows, a previewed version of s
发表于 2025-3-29 03:55:44 | 显示全部楼层
Visual Cryptography with QR-Code Transparencies meaningful, they are just with rough look of a meaningful picture. In this paper, the encoded transparencies are also QR-codes that can be decoded by common QR-code scanner that can be ained in mobile phone. Therefore, people can get more information of this transparencies by scanning the QR-code t
发表于 2025-3-29 08:48:58 | 显示全部楼层
Solving the Multiple Charging Vehicles Scheduling Problem for Wireless Rechargeable Sensor Networks loading of each sensor is different, sensors request for charging in different frequencies. Also, sensors may deplete their energy quickly and need to be charged urgently under some circumstances. Therefore, a good charging route should not only minimize the moving distance of the charging device t
发表于 2025-3-29 13:43:25 | 显示全部楼层
An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Functionproposes a steganography algorithm based on pixel block difference and variable modulus function (PVBD). The algorithm uses the modular function of dynamic parameters to optimize the amplitude of the pixel value modification, and at the same time the related parameters of the mode function are dynam
发表于 2025-3-29 17:39:49 | 显示全部楼层
Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Logge of fuzzy clustering to describe the similarity between security logs and the advantage of sequence pattern to describe the logical relationship in attacking steps. The experimental results show that the algorithm can effectively mine the attack pattern, improve the accuracy and generate more effe
发表于 2025-3-29 21:20:35 | 显示全部楼层
发表于 2025-3-30 02:13:46 | 显示全部楼层
发表于 2025-3-30 04:53:44 | 显示全部楼层
Muting Machine Speech Using Audio Watermarkingkers are in the same environment, in which a dialog system misdetects the other dialog systems voice as a users voice. In this paper, a method to mute synthesized speech is proposed to prevent a speech recognizer from recognizing speech uttered by a machine. The audio watermark technique is used to
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-4 18:46
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表