![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
On the bitmap compression for joint coding and data hiding of AMBTC compressed images
The compressed code of Absolute Moment Block Truncation Coding (AMBTC) consists of quantized values (QVs) and bitmaps. The QVs exhibit greater predictability, and the bitmaps themselves carry more randomness. ...
-
Article
An adaptive data hiding for AMBTC compressed images with recoverability using bound shifting technique
This paper proposes an efficient data hiding method for absolute moment block truncation coding (AMBTC) images with the recoverability of compressed code. The existing methods sacrifice some embedding capacity...
-
Article
Personalized live streaming channel recommendation based on most similar neighbors
With the rapid development of mobile network technology, an increasing number of viewers are watching channels through live streaming platforms, and thousands upon thousands of channels are broadcasting on the...
-
Chapter and Conference Paper
Research on Remote Control of Self-propelled Lawn Mower
Current lawn mower in the market is mainly driven by fuel engines, and users need to operate them at close range. Problems such as noise, dust and foreign object splashes generated when the machine is running ...
-
Article
A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator
Due to a rapid increase in copyright infringement, protecting secret information during transmission on the Internet is very important. More and more researchers have proposed solutions such as steganography, ...
-
Article
An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching
The existing image authentication methods for absolute moment block truncation coding (AMBTC) modify the bits of quantitation levels or bitmaps to embed the authentication code (AC). However, the modification ...
-
Chapter and Conference Paper
Reversible Data Hiding in Partially-Encrypted Images
This paper presents a novel reversible data hiding method for medical images with privacy protection in only partial of the image areas. Specifically, only those areas with privacy protection requirement are e...
-
Article
An efficient reversible data hiding method for AMBTC compressed images
Analyzing multimedia data in mobile devices is often constrained by limited computing capacity and power storage. Therefore, more and more studies are trying to investigate methods with algorithm efficiency. S...
-
Article
Data hiding in AMBTC images using quantization level modification and perturbation technique
A novel data hiding method for Absolute Moment Block Truncation Coding (AMBTC) compressed image based on quantization level modification is proposed. Blocks of AMBTC-compressed image are classified into two ca...
-
Chapter and Conference Paper
Using MapReduce Framework for Mining Association Rules
Data mining in knowledge discovery helps people discover unknown patterns from the collected data. PIETM (Principle of Inclusion–Exclusion and Transaction Map**) algorithmis a novel frequent item sets mining...
-
Chapter and Conference Paper
A Study Using Genetic Algorithm and Support Vector Machine to Find Out How the Attitude of Training Personnel Affects the Performance of the Introduction of Taiwan TrainQuali System in an Enterprise
After entering knowledge economy era, human resource has become one of the most important manufacturing elements of an enterprise, hence, human resource incubation has become one of the important jobs of enter...
-
Chapter and Conference Paper
Using Sequential Pattern Mining to Analyze the Behavior on the WELS
Sequential pattern mining is an important data-mining method for determining time-related behavior in sequence database. This study used the methods of Sequential Pattern Mining to design a system, which was t...
-
Chapter and Conference Paper
Exploring Teachers’ Involvement by Using Fuzzy Theory
With the improvement of the Internet bandwidth and techniques, e-learning environments have been more convenient than ever; they are beyond the limits of time and space, accessible at anytime and anywhere. Eve...
-
Article
A simple and efficient watermark technique based on JPEG2000 Codec
In this paper we propose an effective watermark scheme for embedding and extracting based on the JPEG2000 Codec process. Our embedding algorithm applies the torus automorphisms (TA) technique to break up and s...
-
Chapter and Conference Paper
A New Improvement of JPEG Progressive Image Transmission Using Weight Table of Quantized DCT Coefficient Bits
Traditional JPEG progressive transmission transmits quantized DCT coefficients one by one, and does not consider the importance among the bits in each transmission stage. Thus the reconstructed image quality a...
-
Chapter and Conference Paper
A Progressive Image Transmission Scheme Based on Block Truncation Coding
In this paper, a new progressive image transmission (PIT) method is presented. The proposed method is derived from block truncation coding (BTC), which is a simple and fast image compression method in the spatial...