×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [17]
内容类型
会议论文 [17]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共17条,第1-10条
帮助
限定条件
内容类型:会议论文
专题:湖南大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Reversible data hiding for JPEG images based on channel selection
会议论文
3rd International Conference on Multimedia Systems and Signal Processing, ICMSSP 2018, Shenzhen, China, 2018
作者:
Lu, Can
;
Ou, Bo
;
Quan, Xiajie
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/12/25
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation
会议论文
INFORMATION SECURITY AND DIGITAL FORENSICS, 11, 2010
作者:
Peng, Fei
;
Guo, Re-Si
;
Li, Chang-Tsun
;
Long, Min
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/05
semi-fragile watermarking
integrity verification
data hiding
content authentication
engineering graphics
Bloom filter-based data hiding algorithm in wireless sensor networks
会议论文
5th International Conference on Future Information Technology, FutureTech 2010, Busan, Korea, Republic of, 2010
作者:
Yang, Jiyu
;
Sun, Xingming
;
Wang, Baowei
;
Xiao, Xiangrong
;
Wang, Xiaoliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/05
Secure data transmission of wireless sensor network based on information hiding
会议论文
4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2007, Philadelphia, PA, United states, 2007
作者:
Xiao, Xiangrong
;
Sun, Xingming
;
Yang, Lincong
;
Chen, Minggang
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2020/01/13
Secure data transmission of wireless sensor network based on information hiding
会议论文
2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 393-398, 2007
作者:
Xiao, XR
;
Sun, XM
;
Yang, LC
;
Chen, MG
;
IEEE
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/01/13
wireless sensor network
information hiding
secure transmission
data stream
Steganalysis of data hiding for two-dimensional engineering graphics based on characters statistic
会议论文
2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 1516-1519, 2008
作者:
Fei, P
;
Sun, XM
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/01/13
Image Steganography using Pixel-Value Differencing
会议论文
PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 109-112, 2009
作者:
Zhang, HL
;
Geng, GZ
;
Xiong, CQ
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/13
steganography
pixel-value differencing
blind extraction
data hiding
Coverless Text Information-Hiding Method Based on the Word Rank Map
会议论文
Cloud Computing and Security. Second International Conference, ICCCS 2016. Revised Selected Papers: LNCS 10039, 145-155, 2016
作者:
Zhang, JJ
;
Shen, J
;
Wang, LC
;
Lin, HJ
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
Coverless text information hiding
The rank map
The text big data
Steganography
Reversible Data Hiding Using Non-local Means Prediction
会议论文
Algorithms and Architectures for Parallel Processing. ICA3PP 2016 Collocated Workshops: SCDT, TAPEMS, BigTrust, UCER, DLMCS. Proceedings: LNCS 10049, 125-135, 2016
作者:
Fang, YY
;
Ou, B
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/12/31
Reversible data hiding
Non-local means
Image similarity
Reversible data hiding using non-local means prediction
会议论文
16th International Conference on Algorithms and Architectures for Parallel Processing - ICA3PP 2016 Collocated Workshops: 1st Workshop on Supercomputing Co-Design Technology, SCDT-2016, 1st International Workshop on Theoretical Approaches to Performance E, Granada, Spain, 2016
作者:
Fang, Yingying
;
Ou, Bo
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/12/31
©版权所有 ©2017 CSpace - Powered by
CSpace