Digital watermarking

Discriminating computer graphics images with hidden Markov tree model. Detection of tampering inconsistencies on mobile photos. Robust audio watermarking by using low-frequency histogram. A reversible acoustic steganography by integrity verification.

Подобные документы

  • The purpose of the article is to consider the concept of a trusted digital repository (TDR) - not only in a broad context, but also in fundamental terms, in evaluating the efforts of professionals to set up processes and technical infrastructure.

    статья, добавлен 29.09.2023

  • Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.

    диссертация, добавлен 01.09.2018

  • Studying the possibility of using the Greenstone system to create an integrated digital tourist library for the city of Petra. A survey of students' opinions about the materials and information that should be included in the digital tourism library.

    статья, добавлен 15.03.2023

  • A random access memory. Examples of peripheral devices: expansion card, video card, image scanners, tape drives, microphones, speakers, web and digital cameras. Network or shared printers. Print three-dimensional objects. Printing 3D models from STL file.

    реферат, добавлен 09.12.2014

  • Examine the possibility of employing the Greenstone system to create a digital tourism library for the city of Petra. The stages of building a digital library. students’ opinions about the characteristics of the Greenstone system and its suitability.

    статья, добавлен 05.09.2022

  • Computer security approach. Message authentication codes. Bilinear maps from elliptic curve pairings. Cryptographic hash functions. Method of session key generation. Secure authenticated encryption schemes. An efficient protocol in extended model.

    книга, добавлен 08.03.2014

  • A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.

    статья, добавлен 15.04.2014

  • The concept of human-machine interface. Three types of human-machine interface. The picture of human-machine interaction. The history of the development of human-computer interaction. The first generation of computers Areas and examples of application.

    презентация, добавлен 24.11.2016

  • Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.

    статья, добавлен 29.07.2016

  • Improvement of devices containing electronic elements. Application of mechatronic systems in the automotive industry. Using Solidworks software for the design of mobile robot on four or more wheeled chassis. Calculation of stresses of structural parts.

    статья, добавлен 13.10.2020

  • Functioning system BIOS when enabling the computer. Program CMOS Setup. The main sections of the program BIOS Setup. Advanced BIOS, Chipset Features. Power Management Setup. Adjustment computer system parameter. Determination load device operating system.

    реферат, добавлен 02.06.2009

  • The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.

    статья, добавлен 20.01.2016

  • Reveal and compare modern methods of information search in digital environment. Characterization of the features of the rapid development of information technologies, which shapes spheres of human life, as well as the process of information provision.

    статья, добавлен 22.03.2023

  • Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.

    презентация, добавлен 28.12.2013

  • Analysis of the need for sensors to detect the working environment and collect the necessary information to perform specific tasks in industrial robotics. Object detection algorithm using background subtraction methods for the operation of a robotic arm.

    статья, добавлен 01.02.2019

  • Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.

    статья, добавлен 28.05.2021

  • Under current conditions telecommunication as the most rapidly-developing branch of engineering. Functional scheme digital commutation system for building communication networks. Distinctive features of hardware tools which are used in the system.

    статья, добавлен 27.06.2016

  • Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.

    книга, добавлен 08.03.2014

  • The nodes of computer facilities and microprocessor systems. Architecture and software models of Intel microprocessors. Microprocessor systems on universal microprocessors and its programming. Microprocessor systems on microcontrollers and programming.

    методичка, добавлен 11.10.2014

  • Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.

    контрольная работа, добавлен 14.05.2017

  • Basics of Contemporary Cryptography for Information Technology Practitioners. Codes for Error Detection. Advances in Coding Theory and Cryptography. Arcs, minihypers, and the classification of three-dimensional Griesmer codes. About the code equivalence.

    книга, добавлен 08.03.2014

  • The history and development of computational technologies from physical switches to the microprocessor. Principles batch processing of computer data. Browse famous innovators in the field of interactive paradigm shifts and their main achievements.

    презентация, добавлен 28.12.2013

  • Theoretical foundations of the relativistic paradigm in physics and interactive technologies. An example of a community of interactive computing. Programming tool and tools for computer create physical and electronic worlds in everyday activities.

    презентация, добавлен 28.12.2013

  • Определение термина case-средств - программных средств, поддерживающих процессы создания и сопровождения информационных систем. Характеристика основных преимуществ от использования приложения. Ознакомление с программными продуктами Computer Associates.

    контрольная работа, добавлен 17.01.2015

  • Assistive computer programs are one of the most invaluable technologies for people who are blind: category of inclusive software can be effectively utilized for both educational purposes, enabling its users to work with windowed graphical user interfaces.

    статья, добавлен 15.09.2020

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.