Filter your results
- 3
- 3
- 3
- 1
- 1
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg, Germany. pp.105-112, ⟨10.1007/978-3-642-40779-6_8⟩
Conference papers
lirmm-01379592v1
|
||
|
Joint Optimization of Low-power DCT Architecture and Effcient Quantization Technique for Embedded Image Compression18th International Conference on Very Large Scale Integration (VLSISOC), Sep 2010, Madrid, Spain. pp.155-181, ⟨10.1007/978-3-642-28566-0_7⟩
Conference papers
hal-00685875v1
|
||
|
Estimation of the Hidden Message Length in Steganography: A Deep Learning ApproachInternational Conference on Machine Learning for Networking, MLN 2019, Dec 2019, Paris, France. pp.333-341, ⟨10.1007/978-3-030-45778-5_22⟩
Conference papers
hal-02561728v1
|