{"title":"An Orthogonal QUasi-Affine TRansformation Evolution (O-QUATRE) Algorithm for Global Optimization","authors":"Nengxian Liu, Jeng-Shyang Pan, J. Y. Xue","doi":"10.1007/978-981-13-9710-3_6","DOIUrl":"https://doi.org/10.1007/978-981-13-9710-3_6","url":null,"abstract":"","PeriodicalId":403022,"journal":{"name":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128433822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deformation Analysis of Crude Oil Pipeline Caused by Pipe Corrosion and Leakage","authors":"Yuhong Zhang, Gui Gao, Hang Liu, Q. Meng, Yuli Li","doi":"10.1007/978-981-13-9710-3_30","DOIUrl":"https://doi.org/10.1007/978-981-13-9710-3_30","url":null,"abstract":"","PeriodicalId":403022,"journal":{"name":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116710887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Data Hiding Based on Vector Quantization","authors":"Chin-Feng Lee, Chinchen Chang, Chia-Shou Shih, Somya Agrawal","doi":"10.1007/978-981-13-9714-1_7","DOIUrl":"https://doi.org/10.1007/978-981-13-9714-1_7","url":null,"abstract":"","PeriodicalId":403022,"journal":{"name":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114360523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Automatic Generation of Teaching Video Subtitles Based on Cloud Computing","authors":"Xiangkai Qiu","doi":"10.1007/978-981-13-9714-1_34","DOIUrl":"https://doi.org/10.1007/978-981-13-9714-1_34","url":null,"abstract":"","PeriodicalId":403022,"journal":{"name":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126363279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Trong-The Nguyen, Jeng-Shyang Pan, Truong-Giang Ngo, Thi-Kien Dao
{"title":"A Data Hiding Approach Based on Reference-Affected Matrix","authors":"Trong-The Nguyen, Jeng-Shyang Pan, Truong-Giang Ngo, Thi-Kien Dao","doi":"10.1007/978-981-13-9714-1_6","DOIUrl":"https://doi.org/10.1007/978-981-13-9714-1_6","url":null,"abstract":"","PeriodicalId":403022,"journal":{"name":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124795502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Semantic Document Similarity Calculation Method Based on Double-Relations in Gene Ontology","authors":"Jingyue Hu, Meijing Li, Zijun Zhang, Kaitong Li","doi":"10.1007/978-981-13-9710-3_19","DOIUrl":"https://doi.org/10.1007/978-981-13-9710-3_19","url":null,"abstract":"","PeriodicalId":403022,"journal":{"name":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123595687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adversarial Attack Method in Gray-Box Setting Oriented to Defenses Based on Image Preprocessing","authors":"Yu Gong, Shen Wang, Xunzhi Jiang, Dechen Zhan","doi":"10.1007/978-981-13-9714-1_10","DOIUrl":"https://doi.org/10.1007/978-981-13-9714-1_10","url":null,"abstract":"","PeriodicalId":403022,"journal":{"name":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122706423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Depth Information Estimation-Based DIBR 3D Image Hashing Using SIFT Feature Points","authors":"Chen Cui, Shen Wang","doi":"10.1007/978-981-13-9710-3_39","DOIUrl":"https://doi.org/10.1007/978-981-13-9710-3_39","url":null,"abstract":"","PeriodicalId":403022,"journal":{"name":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131335132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Internal Threat Detection Model Based on Denoising Autoencoders","authors":"Zhaoyang Zhang, Shen Wang, Guangming Lu","doi":"10.1007/978-981-13-9710-3_41","DOIUrl":"https://doi.org/10.1007/978-981-13-9710-3_41","url":null,"abstract":"","PeriodicalId":403022,"journal":{"name":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130589984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Residual Network Based on Deep Layer Aggregation for JPEG Images Steganalysis","authors":"Xinyue Lan, R. Ni, Yao Zhao","doi":"10.1007/978-981-13-9714-1_25","DOIUrl":"https://doi.org/10.1007/978-981-13-9714-1_25","url":null,"abstract":"","PeriodicalId":403022,"journal":{"name":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114913696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}