Intelligent multimedia data hiding

Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.

Подобные документы

  • Some of the more popular techniques in cryptography. The advantages and disadvantages of public-key cryptography compared with secret-key cryptography. Digital signature applications exportable from the United States. Proactive security techniques.

    книга, добавлен 08.03.2014

  • The information technology for graphical data from unmanned aircraft real time processing. The structure and functionality of the automated system, image processing algorithms and video. The used of technology in the development of a pilot workplace.

    статья, добавлен 28.01.2017

  • International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.

    книга, добавлен 08.03.2014

  • Research of the effectiveness of using the Blender 3D software for independent and individual work of students. Creating videos, creating and editing videos with video resources. Organization of video conferencing during online classes and seminars.

    статья, добавлен 01.04.2022

  • Various aspects of multimedia content encryption. His general performance and the fundamental techniques. The common encryption techniques, including complete, partial and compression-combined encryption, will be investigated, analyzed and evaluated.

    книга, добавлен 08.03.2014

  • Development of an algorithm for obtaining a video depth map using the method of image division. Using web cameras to determine the object and calculate the distance to it. Development of software code for streaming video of the experimental setup.

    статья, добавлен 13.07.2022

  • A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.

    книга, добавлен 08.03.2014

  • Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.

    статья, добавлен 14.01.2017

  • Information Hiding, Steganography, and Watermarking. Applications of Watermarking: Owner Identification, Broadcast Monitoring, Proof of Ownership, Transaction Tracking. Properties of Steganographic and Steganalysis Systems. Direct Message Coding.

    дипломная работа, добавлен 08.03.2014

  • The working with excel. The basic operations in the work: creating, editing, copying, removing different data. Editing the cell by using the formula bar and by double-clicking, using the formatting toolbar. Changing the font size and formatting numbers.

    контрольная работа, добавлен 21.11.2010

  • Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.

    учебное пособие, добавлен 08.03.2014

  • Review of Basic Statistics With SPSS. Data Coding and Exploratory Analysis. Selecting and Interpreting Inferential Statistics. Several Measures of Reliability. Exploratory Factor Analysis and Principal Components Analysis. Multiple Linear Regression.

    книга, добавлен 09.04.2013

  • Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.

    статья, добавлен 01.02.2024

  • Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.

    статья, добавлен 13.02.2016

  • Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.

    книга, добавлен 08.03.2014

  • Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.

    статья, добавлен 28.08.2016

  • Исследование вопроса построения финансовой модели компании, работающей в Video-on-Demand сегменте (VoD). Разработка эффективных финансовых моделей, позволяющих прогнозировать основные финансовые метрики, принимать управленческие и операционные решения.

    дипломная работа, добавлен 17.07.2020

  • Создание нового проекта, выбор параметров, размера экрана и частоты кадров. Дополнительные заготовки и запуск программы Adobe Premiere. Кодеки, используемые для редактирования в режиме Video for Windows. Установки аудио в окне "параметры нового проекта".

    контрольная работа, добавлен 13.11.2010

  • Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.

    статья, добавлен 06.05.2018

  • Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.

    статья, добавлен 29.11.2016

  • History of game technology, from simple pixel games to modern digital. The development of games and software video games from the point of view of the programmer. Experts participating in the development of games. Classification types of popular games.

    курсовая работа, добавлен 07.03.2016

  • A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.

    книга, добавлен 08.03.2014

  • The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.

    статья, добавлен 25.06.2024

  • Description of the main optional devices. TabletPC, processing power and hard drive. Scanner is an input device to the PC color or black and white images from paper. Basic user data: resolving power, scan speed, specifications. Printer, mouse, keyboard.

    презентация, добавлен 26.03.2013

  • Study of issues of maximizing small root bounds by linearization and applications of subjects of small secret exponents in RSA. Secure network coding over the integers, and the CCA proxy re-encryption without bilinear maps in the standard model.

    материалы конференции, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.