• Nenhum resultado encontrado

[PDF] Top 20 A Hybrid Steganography System based on LSB Matching and Replacement

Has 10000 "A Hybrid Steganography System based on LSB Matching and Replacement" found on our website. Below are the top 20 most common "A Hybrid Steganography System based on LSB Matching and Replacement".

A Hybrid Steganography System based on LSB Matching and Replacement

A Hybrid Steganography System based on LSB Matching and Replacement

... a hybrid steganographic ap- proach using the least significant bit (LSB) technique for grayscale ...both LSB match- ing (LSB-M) and LSB replacement to hide the secret data ... See full document

7

BIT LENGTH REPLACEMENT STEGANOGRAPHY BASED ON DCT COEFFICIENTS

BIT LENGTH REPLACEMENT STEGANOGRAPHY BASED ON DCT COEFFICIENTS

... proposed LSB matching revisited image steganography and edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference between ... See full document

10

High Capacity and Resistance to Additive Noise Audio Steganography Algorithm

High Capacity and Resistance to Additive Noise Audio Steganography Algorithm

... good steganography algorithm are security, capacity, robustness and imperceptibility, all them are contradictory, therefore, satisfying all together is not easy especially in audio cover signal because ... See full document

9

J. Braz. Comp. Soc.  vol.13 número4

J. Braz. Comp. Soc. vol.13 número4

... is based on the odometer and IMU sensors ...is based on the GPS information. The particles are weighted based on how distant they are from the GPS ...replicated and ... See full document

11

J. Braz. Chem. Soc.  vol.28 número7

J. Braz. Chem. Soc. vol.28 número7

... the system and the time required for coupling between nanocomposite and laccase, for best performance of the ...biosensor and can increase or decrease their sensitivity and/or ... See full document

8

Review of applications of TLBO algorithm and a tutorial for beginners to solve the unconstrained and constrained optimization problems

Review of applications of TLBO algorithm and a tutorial for beginners to solve the unconstrained and constrained optimization problems

... Rao and Patel (2012) computed the total number of function evaluations in the TLBO algorithm as = {(2 × population size × number of generations) + (function evaluations required for duplicate elimination)} ... See full document

30

CONVERTIBLE DRM SYSTEM BASED ON IDENTITY-BASED ENCRYPTION

CONVERTIBLE DRM SYSTEM BASED ON IDENTITY-BASED ENCRYPTION

... easily and rapidly to users over the ...common and become more serious, since the digital contents can be copied and distributed easily through ...contents on devices with different DRM format ... See full document

11

J. Microw. Optoelectron. Electromagn. Appl.  vol.16 número1

J. Microw. Optoelectron. Electromagn. Appl. vol.16 número1

... limitations and other factors, such as ...technologies and wireless communications standards covering numerous applications, the spectrum is currently congested, especially for frequencies up to ... See full document

11

MATCHING AERIAL IMAGES TO 3D BUILDING MODELS BASED ON CONTEXT-BASED GEOMETRIC HASHING

MATCHING AERIAL IMAGES TO 3D BUILDING MODELS BASED ON CONTEXT-BASED GEOMETRIC HASHING

... for matching with stored ...table and all entries in the corresponding hash table bin receive a ...solve matching problems of rotated, translated and partly occluded objects, it has some ...is ... See full document

7

A HYBRID OPTIMIZATION ALGORITHM BASED ON GENETIC ALGORITHM AND ANT COLONY OPTIMIZATION

A HYBRID OPTIMIZATION ALGORITHM BASED ON GENETIC ALGORITHM AND ANT COLONY OPTIMIZATION

... a hybrid optimization algorithm based on GA and ACO to solve TSP is proposed and is then evaluated with some data, both random data and sample data from the library of ... See full document

13

A New Steganography Technique Based on Difference Scheme of  RGB Channels and Text Using Histogram Analysis

A New Steganography Technique Based on Difference Scheme of RGB Channels and Text Using Histogram Analysis

... information and information systems from unauthorized access, use, disclosure, disruption, modification or ...security and information assurance are being used frequently ...interrelated and share ... See full document

6

Hybrid Neuro-Fuzzy Classifier Based On Nefclass Model

Hybrid Neuro-Fuzzy Classifier Based On Nefclass Model

... focuses on examples that are harder to ...increased and weights of correctly classified samples are ...error on weighted ...but on the basis of these weights the subsample is generated ... See full document

21

Skeletal anomalies in reared European fish larvae and juveniles. Part 1: normal and anomalous skeletogenic processes

Skeletal anomalies in reared European fish larvae and juveniles. Part 1: normal and anomalous skeletogenic processes

... inflation and resulting lordosis in European seabass and gilthead seabream (Chatain ...2010) and nutritional (Izquierdo et ...topical and in the past decade many case stud- ies and ... See full document

22

On Random Matching Markets: Properties and Equilibria

On Random Matching Markets: Properties and Equilibria

... We have so far informally described an algorithm in terms of the actions of the agents— proposals by the …rms, and acceptances and rejections by the workers. Consider now a mechanism where agents face the ... See full document

30

DNS ID Covert Channel based on Lower Bound Steganography for Normal DNS ID Distribution

DNS ID Covert Channel based on Lower Bound Steganography for Normal DNS ID Distribution

... message and protect the information with a ...– and that could further invoke activity to decrypt the ...of Steganography. Steganography is a method used to conceal the existence of the ... See full document

8

On Comparison of DFT-Based and DCT-Based Channel Estimation for OFDM System

On Comparison of DFT-Based and DCT-Based Channel Estimation for OFDM System

... better and complexity is less than LSE and ...samples and channel taps by using the Most Significant Taps (MST) ...LMMSE and reduced complexity due to the presence of fast algorithms FFT ... See full document

6

Asynchronous Sequential Symbol Synchronizers based on Pulse Comparison by Hybrid Transitions at Quarter Bit Rate

Asynchronous Sequential Symbol Synchronizers based on Pulse Comparison by Hybrid Transitions at Quarter Bit Rate

... (ab-m) and automatic (ab-a) are better than the variant asynchronous by hybrid at quarter rate with their versions manual (ab-m/4) and automatic (ah- a/4), this is comprehensible because the variant ... See full document

5

An approach for Minutia Extraction in Latent Fingerprint Matching

An approach for Minutia Extraction in Latent Fingerprint Matching

... minutiae and it is one of the most popular categories used in fingerprint ...Automatic and reliable extraction of minutiae from fingerprint images is a critical step in fingerprint ...identification ... See full document

8

Model of experimental clonal seed orchard for the production of Serbian spruce šPicea omorika /Panc./Purkyne) intraspecific hybrids

Model of experimental clonal seed orchard for the production of Serbian spruce šPicea omorika /Panc./Purkyne) intraspecific hybrids

... selected based on intra-line and inter-line variability of the incorporated half-sib lines, by multian- nual analyses and the resulting study data on the dynamics of tree growth ... See full document

9

Decision Making Based On Management Information System  and Decision Support System

Decision Making Based On Management Information System and Decision Support System

... ation and com m unication technologies as change structures of societies, it also affected task of m anager’s m aking ...effective and efficient use of new inform ation and com m unications ...ation ... See full document

10

Show all 10000 documents...