Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "embedding"

ADD TO MY LIST
 
Principles of Audio Watermarking

Author(s): Martin Hrncar | Jan Krajcovic
Carleson embeddings

Author(s): Helmut J. Heiming
Optimal Control of HIV Dynamic Using Embedding Method

Author(s): H. Zarei | A. V. Kamyad | M. H. Farahi
A MOBILE AGENT-BASED EVENT DRIVEN ROUTE DISCOVERY PROTOCOL IN WIRELESS SENSOR NETWORK: AERDP

Author(s): PREETI SETHI | DR. DIMPLE JUNEJA | DR. NARESH CHAUHAN
Magnetopause displacements: the possible role of dust

Author(s): R. A. Treumann | W. Baumjohann
Adult type granulosa cell tumor - morphological features

Author(s): Ioana Buda | Raluca Balan | Crauciuc Eduard | Ovidiu Toma
Image of tumor metastasis and inflammatory lymph node enlargement by contrast-enhanced ultrasonography

Author(s): Takaya Aoki | Fuminori Moriyasu | Kei Yamamoto | Masafumi Shimizu | Masahiko Yamada | Yasuharu Imai
Watermarking Grayscale Images using Text for Copyright Protection

Author(s): Jobin Abraham | Dr.Varghese Paul
IPMA STANDARD ELEMENTS AND FEEDBACK IN PROJECT MANAGEMENT TEACHING

Author(s): BARTOŠKA, Jan | SVOBODOVÁ, Radka | JARKOVSKÁ, Martina
A robust scheme for Digital Video Watermarking based on Scrambling of Watermark

Author(s): Mahesh R. Sanghavi | Dr. Archana M. | Dr. Rajeev Mathur | Kainjan S. Kotecha
A Novel Approach of Color Image Hiding using RGB Color planes and DWT

Author(s): Nilanjan Dey | Anamitra Bardhan Roy | Sayantan Dey
A Robust Wavelet Packet Based Blind Digital Image Watermarking using HVS characteristics

Author(s): C. Patvardhan | A. K. Verma | C. Vasantha Lakshmi
Embeddings into Hyper Petersen Networks: YetAnother Hypercube-Like Interconnection Topology

Author(s): Sajal K. Das | Sabine Öhring | Amit K. Banerjee
Superlative Quantifiers as Modifiers of Meta-Speech Acts

Author(s): Ariel Cohen | Manfred Krifka
Two Types of Belief Report

Author(s): Michael Hegarty
only: A Case Study In Projective Meaning

Author(s): Craige Roberts
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding

Author(s): P.Nithyanandam, T.Ravichandran, N.M.Santron, E. Priyadharshini
Nanoparticle-Liquid Crystalline Elastomer Composites

Author(s): Yan Ji | Jean E. Marshall | Eugene M. Terentjev
JPEG Steganography System with Minimal Changes to the Quantized DCT Coefficients

Author(s): Hamdy A. Morsy | Zaki B. Nossair | Alaa M. Hamdy | Fathy Z. Amer
OFDM Based High Capacity Information Hiding in Grey Scale Image

Author(s): Somnath Maiti | Abhik Roy | Tirtha Sankar Das | Subir Kumar Sarkar
Principles of Audio Watermarking

Author(s): Martin Hrncar | Jan Krajcovic
Hardware Architecture for a Message Hiding Algorithm with Novel Randomizers

Author(s): Saeed Mahmoudpour | Sattar Mirzakuchaki
High Security Image Steganography with Modified Arnold's Cat Map

Author(s): Minati Mishra | Ashanta Ranjan Routray | Sunit Kumar
Neural Modeling of High-Frequency Forward Transmission Coefficient for HEMT and FinFET Technologies

Author(s): Zlatica Marinković | Giovanni Crupi | Dominique M. M.-P. Schreurs | Alina Caddemi | Vera Marković
An Efficient Method of Steganography using Matrix Approach

Author(s): Nirmalya Chowdhury | Puspita Manna
Inverted Pattern in Inverted Time Domain for Icon Steganography

Author(s): Rengarajan Amirtharajan | John Bosco Balaguru Rayappan
CASPER: Embedding Power Estimation and Hardware-Controlled Power Management in a Cycle-Accurate Micro-Architecture Simulation Platform for Many-Core Multi-Threading Heterogeneous Processors

Author(s): Kushal Datta | Arindam Mukherjee | Guangyi Cao | Rohith Tenneti | Vinay Vijendra Kumar Lakshmi | Arun Ravindran | Bharat S. Joshi
Data Hiding in JPEG Images

Author(s): S. K. Muttoo | Sushil Kumar
Solving the Optimal Control of Linear Systems via Homotopy Perturbation Method

Author(s): Mohammad Hadi Farahi | Sara Ghaderi | Fateme Ghomanjani
Solving the Optimal Control of Linear Systems via Homotopy Perturbation Method

Author(s): Mohammad Hadi Farahi | Sara Ghaderi | Fateme Ghomanjani
Watermarking Schemes For Copy Protection : A Survey

Author(s): Dolley Shukla | Manisha Sharma
Image Stenography Skin Tone Detection

Author(s): DEEPALI BHAMARE | VIKAS GUPTA | P.B.SALUNKHE
Robust Non-Oblivious Dwt-Adaptive Invisible Digital Watermarking

Author(s): Sri K.Naga Prakash | Ms.G.Sindhuri | Mr.K.Akshay | Mr.G.Apuroop
Digital Logic Embedding Using Single Row

Author(s): Jasvinder Kaur | Manoj Duhan | Ashok Kumar
A Survey on Digital Video Watermarking

Author(s): Swati Patel | Anilkumar Katharotiya | Mahesh Goyani
Study of the effect DCT and DWT domains on the imperceptibility and robustness of Genetic watermarking

Author(s): Abduljabbar Shaamala | Shahidan M. Abdullah | Azizah A. Manaf
EFFECTIVE IMPLEMENTATION OF EUROPEAN COMMUNITY LAW. A FACILITATING ROLE OF DUTCH GENERAL ADMINISTRATIVE LAW

Author(s): Paul ADRIAANSE | Tom BARKHUYSEN | Willemien DEN OUDEN | Ymre SCHUURMANS
Robust Secure and Blind Watermarking Based on DWT DCT Partial Multi Map Chaotic Encryption

Author(s): Esam A. Hagras | M. S. El-Mahallawy | A. Zein Eldin | M. W. Fakhr
Audio Wave Steganography

Author(s): Ajay.B.Gadicha
Embedding Classical Indices in the FP Family

Author(s): Michela Chessa | Vito Fragnelli
Comparison of the effects of three endodontic irrigants on the free surface energy of radicular dentin

Author(s): Zahed Mohammadi | Loghman Rezaee Sofi | Babak Jaleh | Habib Rezaee Dehghan
On Secure Digital Image Watermarking Techniques

Author(s): Manjit Thapa | Sandeep Kumar Sood
Embedded Dual band Cylindrical Dielectric Resonator Antenna

Author(s): Ahmed Benomar | Noureddine Boukli Hacene | Hicham Megnafi | Patrick Vaudon
Embedding Parallelization in Compilers

Author(s): Liviu Sebastian Matei | Liviu Frateanu
Anonymous Fingerprinting with Robust QIM Watermarking Techniques

Author(s): Prins JP | Erkin Z | Lagendijk RL
Promoting smoking cessation in Pakistani and Bangladeshi men in the UK: pilot cluster randomised controlled trial of trained community outreach workers

Author(s): Begh Rachna | Aveyard Paul | Upton Penney | Bhopal Raj | White Martin | Amos Amanda | Prescott Robin | Bedi Raman | Barton Pelham | Fletcher Monica | Gill Paramjit | Zaidi Qaim | Sheikh Aziz
State of the Art: Embedding Security in Vehicles

Author(s): Wolf Marko | Weimerskirch André | Wollinger Thomas
How Reed-Solomon Codes Can Improve Steganographic Schemes

Author(s): Fontaine Caroline | Galand Fabien
Recoverable Privacy Protection for Video Content Distribution

Author(s): Li Guangzhen | Ito Yoshimichi | Yu Xiaoyi | Nitta Naoko | Babaguchi Noboru
Peak-Shaped-Based Steganographic Technique for JPEG Images

Author(s): Rossi Lorenzo | Garzia Fabio | Cusani Roberto
A Novel Image Data Hiding Scheme with Diamond Encoding

Author(s): Chao Ruey-Ming | Wu Hsien-Chu | Lee Chih-Chiang | Chu Yen-Ping
Reversible Watermarking Techniques: An Overview and a Classification

Author(s): Caldelli Roberto | Filippini Francesco | Becarelli Rudy
Video Data Hiding for Managing Privacy Information in Surveillance Systems

Author(s): Paruchuri JithendraK | Cheung Sen-chingS | Hail MichaelW
Research of Spatial Domain Image Digital Watermarking Payload

Author(s): Jia-Fa Mao | Ru Zhang | Xin-Xin Niu | Yi-Xian Yang | Lin-Na Zhou
Reliable Steganalysis Using a Minimum Set of Samples and Features

Author(s): Miche Yoan | Bas Patrick | Lendasse Amaury | Jutten Christian | Simula Olli
Machine Perception in Automation:A Call to Arms

Author(s): Bruckner Dietmar | Velik Rosemarie | Penya Yoseba
Time-Scale Invariant Audio Data Embedding

Author(s): Mansour Mohamed F | Tewfik Ahmed H
Embedding Color Watermarks in Color Images

Author(s): Chou Chun-Hsien | Wu Tung-Lin
A New Robust Watermarking Scheme to Increase Image Security

Author(s): Rahmani Hossein | Mortezaei Reza | Ebrahimi Moghaddam Mohsen
Symmetrization of Functions and the Best Constant of 1-DIM Sobolev Inequality

Author(s): Watanabe Kohtaro | Kametaka Yoshinori | Nagai Atsushi | Yamagishi Hiroyuki | Takemura Kazuo
Computationally Efficient MIMO HSDPA System-Level Modeling

Author(s): Wrulich Martin | Rupp Markus
Group-Oriented Fingerprinting for Multimedia Forensics

Author(s): Wang Z Jane | Wu Min | Trappe Wade | Liu KJ Ray
Video Waterscrambling: Towards a Video Protection Scheme Based on the Disturbance of Motion Vectors

Author(s): Bodo Yann | Laurent Nathalie | Laurent Christophe | Dugelay Jean-Luc
A Secure and Robust Object-Based Video Authentication System

Author(s): He Dajun | Sun Qibin | Tian Qi
Watermarking Algorithms for 3D NURBS Graphic Data

Author(s): Lee Jae Jun | Cho Nam Ik | Lee Sang Uk
Sonic Watermarking

Author(s): Tachibana Ryuki
Improved Bit Rate Control for Real-Time MPEG Watermarking

Author(s): Pranata Sugiri | Wahadaniah Viktor | Guan Yong Liang | Chua Hock Chuan
Filters Ranking for DWT-Domain Robust Digital Watermarking

Author(s): Dietze Martin | Jassim Sabah
Fast Watermarking of MPEG-1/2 Streams Using Compressed-Domain Perceptual Embedding and a Generalized Correlator Detector

Author(s): Simitopoulos Dimitrios | Tsaftaris Sotirios A | Boulgouris Nikolaos V | Briassouli Alexia | Strintzis Michael G
Broken Arrows

Author(s): Furon Teddy | Bas Patrick
Image Steganalysis with Binary Similarity Measures

Author(s): Avcıbaş İsmail | Kharrazi Mehdi | Memon Nasir | Sankur Bülent
A Multiple-Window Video Embedding Transcoder Based on H.264/AVC Standard

Author(s): Li Chih-Hung | Wang Chung-Neng | Chiang Tihao
Real interpolation with logarithmic functors

Author(s): Evans WD | Opic Bohumír | Pick Luboš
Towards case-based medical learning in radiological decision making using content-based image retrieval

Author(s): Welter Petra | Deserno Thomas | Fischer Benedikt | Günther Rolf | Spreckelsen Cord
Implementation and Evaluation of Multichannel Multi-Interface Routing Mechanism with QoS-Consideration for Ad-Hoc Networks

Author(s): Kajioka Shinsuke | Wakamiya Naoki | Satoh Hiroki | Monden Kazuya | Hayashi Masato | Matsui Susumu | Murata Masayuki
Embedding Protection Inside H.264/AVC and SVC Streams

Author(s): Lamy-Bergot Catherine | Gadat Benjamin
Reversible Watermarking Algorithm with Distortion Compensation

Author(s): Sachnev Vasiliy | Kim HyoungJoong | Suresh Sundaram | Shi YunQing
Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication

Author(s): Liu Hongmei | Yao Xinzhi | Huang Jiwu
Review on Binary Image Steganography and Watermarking

Author(s): Mrs. Gyankamal J. Chhaje | Ms. Krupali V. Deshmukh | Ms. Trupti S. Kulkarni

Tango Rapperswil
Tango Rapperswil

     Save time & money - Smart Internet Solutions