咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 2 篇 secret image sha...
  • 1 篇 deep learning
  • 1 篇 prediction error...
  • 1 篇 histogram-based ...
  • 1 篇 blockchain
  • 1 篇 network infrastr...
  • 1 篇 data hiding

机构

  • 1 篇 department of in...
  • 1 篇 department of in...
  • 1 篇 school of softwa...
  • 1 篇 institute of art...
  • 1 篇 engineering rese...
  • 1 篇 cssc systems eng...

作者

  • 1 篇 tohari ahmad
  • 1 篇 fei peng
  • 1 篇 zhilin huo
  • 1 篇 lingzhi liao
  • 1 篇 yao wan
  • 1 篇 zhili zhou
  • 1 篇 chaidir chalaf i...
  • 1 篇 royyana muslim i...
  • 1 篇 hengfu yang

语言

  • 2 篇 英文
检索条件"主题词=Secret image sharing"
2 条 记 录,以下是1-10 订阅
排序:
The Review of secret image sharing
收藏 引用
Journal of New Media 2023年 第1期5卷 45-53页
作者: Yao Wan Lingzhi Liao Zhili Zhou Hengfu Yang Fei Peng Zhilin Huo Engineering Research Center of Digital Forensics Ministry of EducationNanjing University of Information Science and TechnologyNanjing210044China School of Software Nanjing University of Information Science and TechnologyNanjing210044China Institute of Artificial Intelligence and Blockchain Guangzhou UniversityGuangzhou510006GuangdongChina Department of Information Science and Engineering Hunan First Normal UniversityChangsha410205China CSSC Systems Engineering Research Institute BeijingChina
secret image sharing(SIS)is a significant research topic of image information hiding,which divides the image into multiple shares and dis-tributes them to multiple parties for management and *** order to reconstruct t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Reversible data hiding based on histogram and prediction error for sharing secret data
收藏 引用
Cybersecurity 2023年 第4期6卷 109-122页
作者: Chaidir Chalaf Islamy Tohari Ahmad Royyana Muslim Ijtihadie Department of Informatics Institut Teknologi Sepuluh Nopember(ITS)Kampus ITS Keputih SukoliloSurabaya60111Indonesia
With the advancement of communication technology,a large number of data are constantly transmitted through the internet for various purposes,which are prone to be illegally accessed by third ***,securing such data is ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论