Linked e-resources

Details

Intro
Organization
Preface
Contents
About the Editors
Multimedia
Reversible Data Hiding in Encrypted Image Based on MSB Inversion
1 Introduction
2 Related Works
2.1 Secret Embedding Procedure
2.2 Message Extracting and Image Recovery
3 The Proposed Method
3.1 Image Encryption and Secret Embedding
3.2 Message Extracting and Image Recovery
4 Experimental Result
5 Conclusion
References
Comments on the Visual Binary QR Code
1 Introduction
2 Schemes of Visual Binary QR Code
2.1 Unitag
2.2 QArt
2.3 Halftone QR Code
3 Comparisons

4 Conclusions
References
NLP-Based Hardware Solution for Censoring Audio on Over-the-Top (OTT) Media Services
1 Introduction
2 Related Work
3 Proposed Method
3.1 Hardware Architecture
3.2 Software Architecture
4 Experiments & Results
4.1 Application Components & Input Dataset
4.2 Accommodations for Lag
4.3 Results
5 Conclusion and Future Work
References
Efficient Steganographic Method Based on Modulo Cube
1 Introduction
2 Related Works
3 Proposed Method
3.1 Preliminary Phase
3.2 Embedding Phase
3.3 Extraction phase

4 Experimental Results
5 Conclusions
References
A High Capacity Reversible Data Hiding in Encrypted Images Using Multi-MSB Prediction and Huffman Coding
1 Introduction
2 Proposed Method
2.1 Apply the Huffman Tree Building Algorithm
2.2 Reduce Reference Bytes
2.3 Remove the Redundant Length Column
3 Experimental Results
3.1 Commonly Used Test Images
4 Conclusion
References
Reversible Data Hiding Based on Bidirectional Generalized Integer Transform
1 Introduction
2 Qiu et al. Scheme
3 Proposed Scheme
4 Experimental Results
5 Conclusions

4.4 Validity Analysis
5 Results
5.1 The Structural Equation Modeling (SEM) Results for Mobile Payment Security-Mobile Payment Use Intention
5.2 The Impact of Consumers' Mobile Payment Security on Consumers' Mobile Payment Use Intention
6 Conclusions
References
Research on the Analysis of Key Attack Modes in a Wireless Environment
1 Introduction
2 The Proposed Scheme
2.1 Method Architecture
2.2 Test Flow Chart
2.3 Introduction to WPA2 Four-Way Handshakes Process
3 Analysis of Key Attack Modes
3.1 Dictionary Cracking Mode
3.2 Script Cracking Mode

Browse Subjects

Show more subjects...

Statistics

from
to
Export