skip to main content
Show Results with:

Results 1 - 10 of 12  for Explore Further

results 1 2 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Material Type:
Conference Proceeding
Add to My workspace

Rethinking the high capacity 3D steganography: Increasing its resistance to steganalysis

2017 IEEE International Conference on Image Processing (ICIP), September 2017, pp.510-414

No full-text

View all versions
2
Material Type:
Conference Proceeding
Add to My workspace

An efficient lossless (2, n) secret image sharing based on Blakley's scheme

2017 IEEE 19th International Workshop on Multimedia Signal Processing (MMSP), October 2017, pp.1-6

No full-text

View all versions
3
Material Type:
Conference Proceeding
Add to My workspace

Rethinking the High Capacity 3D Steganography : Increasing its Resistance to Steganalysis

(2017\) Rethinking the High Capacity 3D Steganography : Increasing its Resistance to Steganalysis. In: IEEE International Conference on Image Processing (ICIP\). IEEE , pp. 510-514

Full text available

4
Material Type:
Conference Proceeding
Add to My workspace

From Visual Confidentiality To Transparent Format-Compliant Selective Encryption Of 3D Objects

2018 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), July 2018, pp.1-6

No full-text

View all versions
5
Material Type:
Article
Add to My workspace

Format-Compliant Selective Secret 3-D Object Sharing Scheme

IEEE Transactions on Multimedia, September 2019, Vol.21(9), pp.2171-2183 [Peer Reviewed Journal]

No full-text

View all versions
6
Material Type:
Conference Proceeding
Add to My workspace

Privacy Protection for Social Media Based on A Hierarchical Secret Image Sharing Scheme

2019 IEEE International Conference on Image Processing (ICIP), September 2019, pp.679-683

No full-text

7
Material Type:
Conference Proceeding
Add to My workspace

A Format-compliant Selective Secret 3D Object Sharing Scheme Based on Shamir's Scheme

ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2019, pp.2657-2661

No full-text

View all versions
8
Material Type:
Conference Proceeding
Add to My workspace

PRIVACY PROTECTION FOR SOCIAL MEDIA BASED ON A HIERARCHICAL SECRET IMAGE SHARING SCHEME

2019 IEEE International Conference on Image Processing (ICIP)

No full-text

9
Material Type:
Conference Proceeding
Add to My workspace

Dustiness of 14 carbon nanotubes using the vortex shaker method

Journal of Physics: Conference Series, 2017, Vol.838(1), p.012005 (12pp) [Peer Reviewed Journal]

No full-text

View all versions
10
Material Type:
Article
Add to My workspace

Prey weight and overwhelming difficulty impact the choice of retrieval strategy in the Neotropical ant Gnamptogenys sulcata (F. Smith)

Insectes Sociaux, November 2007, Vol.54(4), pp.319-328 [Peer Reviewed Journal]

No full-text

View all versions

Results 1 - 10 of 12  for Explore Further

results 1 2 next page

Refine Search Results

Refine my results

Material type 

  1. Conference Proceedings  (10)
  2. Articles  (2)
  3. Refine further open sub menu

Creation date 

From To

Try a new search

Ignore my search and look for everything

by this Author/Contributor:

  1. Puech, William
  2. Beugnon, Sebastien
  3. Beugnon, S.
  4. Puech, W.
  5. Pedeboy, J.-P.

Searching Remote Databases, Please Wait