نتایج جستجو برای: embedding method
تعداد نتایج: 1686665 فیلتر نتایج به سال:
Many watermark algorithms were proposed for protecting digital media from unauthorized use. Visible watermark scheme indicates the copyright of a digital media by embedding an inconspicuous but recognizable pattern into the media. However, the embedding process often results in serious distortion in the protected content, and the embedding process is not reversible. This paper proposes a revers...
Combining the Syndrome-Trellis Codes (STC) proposed recently, a new steganography method for JPEG images is presented in this paper. The method improves embedding efficiency by using the STC, and then preserves the DCT coefficient histogram statistic feature by constraining the proportion that are used for information embedding among the coefficients with the absolute value equal to one. Experi...
This paper proposes a de-embedding method for on-chip S-parameter measurements at mm-wave frequency. The proposed method uses only two transmission lines with different length. In the proposed method, a parasitic-component model extracted from two transmission lines can be used for de-embedding for other-type DUTs like transistor, capacitor, inductor, etc. The experimental results show that the...
Neighborhood Preserving Embedding (NPE) is a subspace learning algorithm. Since NPE is a linear approximation to Locally Linear Embedding (LLE) algorithm, it has good neighborhood-preserving properties. Although NPE has been applied in many fields, it has limitations to solve recognition task. In this paper, a novel subspace method, named Kernel Fisher Neighborhood Preserving Embedding (KFNPE),...
Steganography is an ancient art of conveying messages in a secret way that only the receiver knows the existence of message. So, a fundamental requirement for a steganographic method is imperceptibility; this means that the embedded messages should not be discernible to the human eye. There are two other requirements, one is to maximize the embedding capacity, and the other is security. The lea...
In this paper, we present a novel steganographic method for embedding of a secret data in still grayscale JPEG image. In order to provide large capacity of pro– posed method while maintaining good visual quality of stego-image, the embedding process is performed in quan– tized transform coefficients of Discrete Cosine transform (DCT) by modifying coefficients according to modulo function, what ...
We present a method for learning an embedding that places images of humans in similar poses nearby. This embedding can be used as a direct method of comparing images based on human pose, avoiding potential challenges of estimating body joint positions. Pose embedding learning is formulated under a triplet-based distance criterion. A deep architecture is used to allow learning of a representatio...
A category of techniques for secret data communication called steganography hides data in multimedia mediums. It involves embedding secret data into a cover-medium by means of small perceptible and statistical degradation. In this paper, a new adaptive steganography method based on contourlet transform is presented that provides large embedding capacity. We called the proposed method ContSteg. ...
A matrix embedding code was developed as a commonly used steganographic technique in which a parity-check matrix is used to perform embedding. However, a drawback of high decoding complexity for linear block codes by using the maximum-likelihood algorithm is unrealistic. This paper proposes a simple and effective trellis embedding scheme for binary messages. Compared with a matrix embedding alg...
Embedding method has become a popular way to handle unstructured data, such as word and text. Word embedding, providing computational-friendly representations for word similarity, is almost be one of the standard solutions for various text mining tasks. Lots of recent studies focusing on word embedding try to generate a more comprehensive representation for each word that incorporating task-spe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید