Search

Your search keyword '"Computer Science::Multimedia"' showing total 7,561 results

Search Constraints

Start Over You searched for: Descriptor "Computer Science::Multimedia" Remove constraint Descriptor: "Computer Science::Multimedia" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
7,561 results on '"Computer Science::Multimedia"'

Search Results

1. Nash Equilibrium Control Policy Against Bus-off Attacks in CAN Networks

2. Input-Output History Feedback Controller for Encrypted Control With Leveled Fully Homomorphic Encryption

3. Robust Digital Image Encryption Approach Based on Extended Large-Scale Randomization Key-Stream Generator

4. State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and Insecurity

5. Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback–Leibler Divergence

6. Multiview PCA: A Methodology of Feature Extraction and Dimension Reduction for High-Order Data

7. Stealth Data Injection Attacks with Sparsity Constraints

8. Compressed sensing based fingerprint imaging system using a chaotic model-based deterministic sensing matrix

9. An FPP-resistant SVD-based image watermarking scheme based on chaotic control

10. HERS: Homomorphically Encrypted Representation Search

11. Performance Analysis for Covert Communications Under Faster-Than-Nyquist Signaling

12. Can we Bring EM Enhancement to the Multi-wavelength Scale?*

13. Audio Bank: A High-Level Acoustic Signal Representation for Audio Event Recognition

14. Uniform modelling of the stellar density of thirteen tidal streams within the Galactic halo

15. Image Encryption Algorithm Based on Artificial Bee Colony Algorithm and Chaotic System

16. Fuzzified Contrast Enhancement for Nearly Invisible Images

17. Detection of Double JPEG Compression With the Same Quantization Matrix via Convergence Analysis

18. Kullback–Leibler-Divergence-Based Attacks Against Remote State Estimation in Cyber-Physical Systems

19. Stochastic Denial-of-Service Attack Allocation in Leader-Following Multiagent Systems

20. Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain

21. Worst-Case Stealthy Attacks on Stochastic Event-Based State Estimation

22. Wireless Sensor Network Security Based on Improved Identity Encryption

23. A truncated SVD-based ARIMA model for multiple QoS prediction in mobile edge computing

24. Automatic detection of low surface brightness galaxies from Sloan Digital Sky Survey images

25. Robust Watermarking Algorithm against the Geometric Attacks based on Non-Subsampled Shearlet Transform and Harris-Laplace Detector

26. Robust color image watermarking using multiple fractional-order moments and chaotic map

27. Convolutional Code Theory based Steganography Technique

28. Forensic Analysis of JPEG-Domain Enhanced Images via Coefficient Likelihood Modeling

29. Noise Removal in Embedded Image With Bit Approximation

30. Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking

31. An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm

32. Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare

33. Efficient Hybrid DCT-Wiener Algorithm Based Deep Learning Approach For Semantic Shape Segmentation

34. Quantum Attacks on 1K-AES and PRINCE

35. A New Image Encryption Algorithm Based on Multi Chaotic System

36. A Proposed Technique for Gray Image Colorization

37. Nature Inspired Algorithm for Pixel Location Optimization in Video Steganography Using Deep RNN

38. STPD: Defending against ℓ0-norm attacks with space transformation

39. Modified Multiway Pixel-Value Differencing Methods Based on General Quantization Ranges for Image Steganography

40. A novel application on mutually orthogonal graph squares and graph-orthogonal arrays

41. Cryptographic switching functions for multiplicative watermarking in cyber-physical systems

42. A Reinforcement-Learning-Based Energy-Efficient Framework for Multi-Task Video Analytics Pipeline

43. Lossless White Balance for Improved Lossless CFA Image and Video Compression

44. Elastic Full-Waveform Inversion Using Both the Multiparametric Approximate Hessian and the Discrete Cosine Transform

45. Efficient VLSI architecture of 3D discrete transformation

46. MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP

47. Image Restoration Quality Assessment Based on Regional Differential Information Entropy

48. A novel conservative chaos driven dynamic DNA coding for image encryption

49. A Study of Athlete Pose Estimation Techniques in Sports Game Videos Combining Multiresidual Module Convolutional Neural Networks

50. Multimedia Image Encryption Analysis Based on High-Dimensional Chaos Algorithm

Catalog

Books, media, physical & digital resources