نتایج جستجو برای: embedding method

تعداد نتایج: 1686665  

2016
Jun Suzuki Masaaki Nagata

This paper proposes an incremental learning strategy for neural word embedding methods, such as SkipGrams and Global Vectors. Since our method iteratively generates embedding vectors one dimension at a time, obtained vectors equip a unique property. Namely, any right-truncated vector matches the solution of the corresponding lower-dimensional embedding. Therefore, a single embedding vector can ...

2009
Takuichi Hirano Hiroshi Nakano Yasutake Hirachi Jiro Hirokawa Makoto Ando

Accurate characterization of field effect transistors (FETs) is necessary for accurate design of monolithic-microwave integrated-circuit (MMIC). Extraction of FET parameters is difficult because the FET is embedded in the parasitic circuit, which is referred to as test element group (TEG), as shown in Fig.1 to connect probe and biases. De-embedding method using open/shortTEG [1] had been widely...

2017
Cao Thi Luyen

In this paper a reversible watermarking method based on generalized integer transform of a vector with n pixels is presented. This method was firstly introduced by Alattar (called Alattar’s method) has been concerned and expanded because it can achieve high embedding capacity without losing the implication of the cover. According to Alattar’s method, n-1 bits could be embedded into a vector wit...

2013
Tzu-Chuen Lu Shou Chen Kai yung Lin Wen Chin

Volume 2, Issue 1 January February 2013 Page 186 Abstract: Reversible watermarking is broadly used in military and medical applications. In this paper we are presenting a novel pixel replacement method, whose watermark is robust to geometric attack as well as it has maximum embedding capacity than all histogram shifting methods. This idea is generated from histogram shifting method, a well know...

2013
Zhenxing Qian Xiyu Han Xinpeng Zhang

This work proposes a novel scheme of separable reversible data hiding for encrypted image using histogram modification. After the original image is encrypted by the sender, the data-hider embeds the secret message into the encrypted image by a histogram modification and n-nary data hiding scheme. On the receiver side, the secret message can be extracted by the embedding key, and the original im...

2006
Geruta Kazakevičiūtė Eugenijus Januškevičius René Rosenbaum Heidrun Schumann

t Abstract.Thenewembeddingmethodofannotationsintorasterimagesispresentedinthearticle.Themethod combines the principles of watermarking and steganography. Using the method proposed it is possible to attach the information to the raster image and bind it to a specified object or region of the image. The JPEG2000 raster images coding standard is used as base to realize the embedding and extracting...

2008
Weiming Zhang Xinpeng Zhang Shuozhong Wang

For good security and large payload in steganography, it is desired to embed as many messages as possible per change of the coverobject, i.e., to have high embedding efficiency. Steganographic codes derived from covering codes can improve embedding efficiency. In this paper, we propose a new method to construct stego-codes, showing that not just one but a family of stego-codes can be generated ...

2007
Junsong Yin Dewen Hu Zongtan Zhou

Locally linear embedding is an effective nonlinear dimensionality reduction method for exploring the intrinsic characteristics of high dimensional data. This paper proposes a new manifold learning method, which is based on locally linear embedding and growing neural gas and is termed growing locally linear embedding (GLLE). GLLE overcomes the major limitations of the original locally linear emb...

Journal: :Pattern Recognition 2010
Vajiheh Sabeti Shadrokh Samavi Mojtaba Mahdavi Shahram Shirani

In this paper a steganalysis technique is proposed for pixel value differencing method. This steganographic method, which is immune against conventional attacks, performs the embedding in the difference of the values of pixel pairs. Therefore, the histogram of the differences of an embedded image is different as compared with a cover image. A number of characteristics are identified in the diff...

Journal: :IJDCF 2017
Fang Sun Zhenghui Liu Chuanda Qi

The existed content authentication schemes based on digital watermark have some shortcomings. In order to solve the problems, a speech content authentication scheme based on high-capacity watermark embedding is proposed, and the high-capacity embedding method is discussed. Firstly, speech signal is framed and segmented, and the samples of each segment are scrambled. Secondly, DCT is performed o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید