On protection of compressed image in fading channel using data hiding (English)
- New search for: Phadikar, A.
- New search for: Maity, S. P.
- New search for: Phadikar, A.
- New search for: Maity, S. P.
- New search for: Sahin, F.
- New search for: Martinez, G.
- New search for: Marmol, F. G.
- New search for: Calero, J. M. A.
In:
Special issue on Recent Advances in Security and Privacy in Distributed Communications and Image processing
5
;
1278-1298
;
2012
-
ISSN:
- Article (Journal) / Print
-
Title:On protection of compressed image in fading channel using data hiding
-
Contributors:Phadikar, A. ( author ) / Maity, S. P. ( author ) / Sahin, F. / Martinez, G. / Marmol, F. G. / Calero, J. M. A.
-
Published in:Special issue on Recent Advances in Security and Privacy in Distributed Communications and Image processing , 5 ; 1278-1298COMPUTERS AND ELECTRICAL ENGINEERING ; 38, 5 ; 1278-1298
-
Publisher:
- New search for: Elsevier Science B.V., Amsterdam.
-
Publication date:2012-01-01
-
Size:21 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 621.382
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 621.382 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 38, Issue 5
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1033
-
Introduction to Recent Advances in Security and Privacy in Distributed CommunicationsMartínez, Gregorio / Mármol, Félix Gómez / Alcaraz Calero, José M. et al. | 2012
- 1035
-
A systematic gradient-based method for the computation of fingerprint’s orientation fieldMei, Yuan / Cao, Guo / Sun, Huaijiang / Hou, Rongtao et al. | 2011
- 1047
-
Pulse quarantine strategy of internet worm propagation: Modeling and analysisYao, Yu / Guo, Lei / Guo, Hao / Yu, Ge / Gao, Fu-xiang / Tong, Xiao-jun et al. | 2011
- 1062
-
Automatic network intrusion detection: Current techniques and open issuesCatania, Carlos A. / Garino, Carlos García et al. | 2012
- 1073
-
A framework for establishing trust in the CloudAbbadi, Imad M. / Alawneh, Muntaha et al. | 2012
- 1088
-
Modeling access control for cyber-physical systems using reputationChen, Dong / Chang, Guiran / Sun, Dawei / Jia, Jie / Wang, Xingwei et al. | 2012
- 1102
-
Definition of response metrics for an ontology-based Automated Intrusion Response SystemsMateos, Verónica / Villagrá, Víctor A. / Romero, Francisco / Berrocal, Julio et al. | 2012
- 1115
-
Mitigation of DHCP starvation attackMukhtar, Husameldin / Salah, Khaled / Iraqi, Youssef et al. | 2012
- 1129
-
Zero Configuration Networking: Implementation, performance, and securitySiddiqui, Farhan / Zeadally, Sherali / Kacem, Thabet / Fowler, Scott et al. | 2012
- 1146
-
A cyber-physical experimentation environment for the security analysis of networked industrial control systemsGenge, Béla / Siaterlis, Christos / Nai Fovino, Igor / Masera, Marcelo et al. | 2012
- 1162
-
Introduction to Special Issue on Image ProcessingSahin, Ferat et al. | 2012
- 1164
-
Robust gray-scale logo watermarking in wavelet domainBhatnagar, Gaurav / Jonathan Wu, Q.M. / Raman, Balasubramanian et al. | 2012
- 1177
-
Human typical action recognition using gray scale image of silhouette sequenceHuang, Bin / Tian, Guohui / Zhou, Fengyu et al. | 2012
- 1186
-
Automatic recognition vision system guided for apple harvesting robotJi, Wei / Zhao, Dean / Cheng, Fengyi / Xu, Bo / Zhang, Ying / Wang, Jinjing et al. | 2011
- 1196
-
Toggle and top-hat based morphological contrast operatorsBai, Xiangzhi / Zhou, Fugen / Xue, Bindang et al. | 2011
- 1205
-
Corner turn of SAR data based on multi-FPGAs parallel systemShen, Huanghui / Wang, Zhensong / Zheng, Weimin et al. | 2012
- 1213
-
Efficient registration of optical and infrared images via modified Sobel edging for plant canopy temperature estimationYang, Weiping / Wang, Xuezhi / Moran, Bill / Wheaton, Ashley / Cooley, Nicola et al. | 2012
- 1222
-
Design and VLSI implementation of a high-performance face detection engineHan, Dongil / Choi, Jongho / Kim, Byungwhan / Cho, Jae Il et al. | 2011
- 1240
-
A RGB image encryption algorithm based on DNA encoding and chaos mapLiu, Lili / Zhang, Qiang / Wei, Xiaopeng et al. | 2012
- 1249
-
A high capacity and strong robust fingerprinting for compressed imagesLi, Xinwei / Guo, Baolong / Chen, Long / Wu, Xianxiang / Li, Leida et al. | 2011
- 1262
-
Shock coupled fourth-order diffusion for image enhancementJidesh, P. / George, Santhosh et al. | 2012
- 1278
-
On protection of compressed image in fading channel using data hidingPhadikar, Amit / Maity, Santi P. et al. | 2011
- 1299
-
Localized discriminative scale invariant feature transform based facial expression recognitionSoyel, Hamit / Demirel, Hasan et al. | 2011
- 1310
-
From single watermark to dual watermark: A new approach for image watermarkingShen, Hong / Chen, Bo et al. | 2012
- 1325
-
Efficient parallel architecture for multi-level forward discrete wavelet transform processorsAziz, Syed Mahfuzul / Pham, Duc Minh et al. | 2012
- 1336
-
Image super-resolution by dictionary concatenation and sparse representation with approximate L 0 norm minimizationLu, Jinzheng / Zhang, Qiheng / Xu, Zhiyong / Peng, Zhenming et al. | 2011
- 1346
-
Local Upsampling Fourier Transform for accurate 2D/3D image registrationWang, Cailing / Jing, Xiaoyuan / Zhao, Chunxia et al. | 2012
- 1358
-
ICTEDCT-CBIR: Integrating curvelet transform with enhanced dominant colors extraction and texture analysis for efficient content-based image retrievalYoussef, Sherin M. et al. | 2012
- IFC
-
Editorial Board| 2012