달력

52024  이전 다음

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
Posted by kingjung
|
Posted by kingjung
|

6th International Conference on Signal Processing and Integrated Networks (SPIN 2019)

Posted by kingjung
|

6th International Conference on Signal Processing and Integrated Networks (SPIN 2019)

Posted by kingjung
|

2019 4th International Conference on Intelligent Information Technology

Posted by kingjung
|

367th International Conference On Electrical and Electronics Engineering(ICEEE)

Posted by kingjung
|

ICMLSC 2019 Proceedings of the 3rd International Conference on Machine Learning and Soft Computing  
Pages 12-15  

Posted by kingjung
|

International Conference on Science, Technology, Engineering and Management (ICSTEM) 2018

Posted by kingjung
|

IJAS Conference 2018

Posted by kingjung
|

World IT Congress 2018 Jeju

Posted by kingjung
|

World IT Congress 2018 Jeju

Posted by kingjung
|

International Conference on Electronics, Information, and Communication (ICEIC) 2018

Posted by kingjung
|

International Conference on Innovative Trends in Computer, Engineering and Applied Sciences (ITCEA-2017)

Posted by kingjung
|

Journal of Arts and Sciences Conference Series, 2017

Posted by kingjung
|

Proceedings of Academics World 73rd International Conference, Taipei, Taiwan, 26-27 July 2017, pp. 12-14

Posted by kingjung
|

World IT Congress 2016 (http://www.worlditcongress.org/2016jeju/)

Posted by kingjung
|

CEEE 2017

Posted by kingjung
|
Posted by kingjung
|
This paper proposes a new data hiding method for twocolor images by two stage referencing. The cover image is partitioned into n x n non-overlapping sub-blocks, and calculated different values by two stages for all pixel to find the suitable replacement pixel. For a one stage, neighboring pixels with (n + 2) x (n + 2) are used to obtain difference value which is different with the current pixel value and (n + 4) x (n + 4) pixels are referenced for next stage. These two values are used to embed a secret bit on a subblock. The experimental results show that the proposed method achieves a good visual quality for the watermarked image and a high capacity for various n x n sub-block.

Ubiquitous Multimedia Computing, International Symposium on 13-15 Oct. 2008. Page(s). 206-209
Posted by kingjung
|
X. Zhang and S. Wang proposed an Exploiting Modification Direction (EMD) method that fully exploits modification directions. Modifications in different directions were used to represent different secret data. In 5-ary notational system, only one secret digit is embedded for each twopixel. This paper proposes an improved method for EMD which can hide more secret data while maintaining a high PSNR value. The proposed method could embed on every pixel for cover data. The experimental results demonstrate that the proposed method has a high capacity and good quality.

Ubiquitous Multimedia Computing, International Symposium on 13-15 Oct. 2008. Page(s). 264-266
Posted by kingjung
|