نتایج جستجو برای: embedding method

تعداد نتایج: 1686665  

Journal: :Bulletin of Electrical Engineering and Informatics 2021

The enormous development in the utilization of Internet has driven by a continuous improvement region security. enhancement security embedded techniques is applied to save intellectual property. There are numerous types mechanisms. Steganography art and science concealing secret information inside cover media such as image, audio, video text, without drawing any suspicion eavesdropper. text ide...

2006
David Freeman

We present a general framework for constructing families of elliptic curves of prime order with prescribed embedding degree. We demonstrate this method by constructing curves with embedding degree k = 10, which solves an open problem posed by Boneh, Lynn, and Shacham [6]. We show that our framework incorporates existing constructions for k = 3, 4, 6, and 12, and we give evidence that the method...

2007
David Freeman

We present a general framework for constructing families of elliptic curves of prime order with prescribed embedding degree. We demonstrate this method by constructing curves with embedding degree k = 10, which solves an open problem posed by Boneh, Lynn, and Shacham [6]. We show that our framework incorporates existing constructions for k = 3, 4, 6, and 12, and we give evidence that the method...

Journal: :IET Information Security 2011
Yongfeng Huang Shanyu Tang Chunlan Bao Yau Jim Yip

A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This paper reveals our findings in analysing the principle of G.723.1 codec that there are ‘unused’ bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detecti...

Journal: :CoRR 2017
Xu Sun Bingzhen Wei Xuancheng Ren Shuming Ma

We propose a method, called Label Embedding Network, which can learn label representation (label embedding) during the training process of deep networks. With the proposed method, the label embedding is adaptively and automatically learned through back propagation. The original one-hot represented loss function is converted into a new loss function with soft distributions, such that the origina...

2010
Yongfeng Huang Shanyu Tang Chunlan Bao Jim Yip

A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This paper reveals our findings in analysing the principle of G.723.1 codec that there are ‘unused’ bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detecti...

Journal: :CoRR 2015
Xiaochao Qu Suah Kim Run Cui Hyoung Joong Kim

An accurate predictor is crucial for histogramshifting (HS) based reversible data hiding methods. The embedding capacity is increased and the embedding distortion is decreased simultaneously if the predictor can generate accurate predictions. In this paper, we propose an accurate linear predictor based on weighted least squares (WLS) estimation. The robustness of WLS helps the proposed predicto...

Journal: :J. Visual Communication and Image Representation 2011
Xin Liao Qiaoyan Wen Jie Zhang

To improve the embedding capacity and provide an imperceptible visual quality, a novel steganographic method based on four-pixel differencing and modified least significant bit (LSB) substitution is presented. The average difference value of a four-pixel block is exploited to classify the block as a smooth area or an edge area. Secret data are hidden into each pixel by the k-bit modified LSB su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید