Výsledky vyhledávání - "Image Processing and Computer Vision—Applications General Terms Security"
-
1
Autoři:
Přispěvatelé:
Témata: Categories and Subject Descriptors I.4.9 [Computing Methodologies, Image Processing and Computer Vision—Applications General Terms Security, Algorithms, Theory Keywords Steganography, embedding impact, Markov random field, Gibbs sampling
Popis souboru: application/pdf
-
2
Autoři:
Přispěvatelé:
Témata: Categories and Subject Descriptors I.4.9 [Computing Methodologies, Image Processing and Computer Vision—Applications General Terms Security, Algorithms, Theory Keywords Steganography, embedding impact, Markov random field, Gibbs sampling
Popis souboru: application/pdf
-
3
Autoři:
Přispěvatelé:
Témata: Categories and Subject Descriptors I.4.9 [Computing Methodologies, Image Processing and Computer Vision—Applications General Terms Security, Algorithms, Theory Keywords Jsteg, Symmetric Jsteg, Quantitative Steganalysis, Maximum Likelihood, Precover, Zero Message Hypothesis
Popis souboru: application/pdf
-
4
Autoři:
Přispěvatelé:
Témata: Categories and Subject Descriptors I.4.9 [Computing Methodologies, Image Processing and Computer Vision—Applications General Terms Security, Algorithms, Theory Keywords Calibration, Steganalysis, Features, YASS
Popis souboru: application/pdf
-
5
Přispěvatelé: The Pennsylvania State University CiteSeerX Archives
Témata: Categories and Subject Descriptors I.4.9 [Computing Methodologies, Image Processing and Computer Vision—Applications General Terms Security, Algorithms, Theory Keywords Jsteg, Symmetric Jsteg, Quantitative Steganalysis, Maximum Likelihood, Precover, Zero Message Hypothesis
Popis souboru: application/pdf
-
6
Autoři:
Přispěvatelé:
Témata: Categories and Subject Descriptors I.4.9 [Computing Methodologies, Image Processing and Computer Vision—Applications General Terms Security, Algorithms, Theory Keywords Steganography, distortion function, JPEG, side-informed embedding
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.352.8191; http://dde.binghamton.edu/vholub/pdf/ACMIH2013_Digital_Image_Steganography_Using_Universal_Distortion.pdf
Nájsť tento článok vo Web of Science