Using Reversible Steganography Algorithm to Embed Metadata in Vector Maps
暂无分享,去创建一个
Wei-Pang Yang | Fu-Mei Chen | Sheng-Ming Wang | Kai-Wei Chen | Wei-Pang Yang | Kaiying Chen | Sheng-Ming Wang | Fu-Mei Chen
[1] Oliver Günther,et al. Metadata in Geographic and Environmental Data Management , 1998, Multimedia Data Management.
[2] David Kahn,et al. The History of Steganography , 1996, Information Hiding.
[3] Fu-Mei Chen,et al. The Development of a Ubiquitous Geographic Information Service by Using Service-Oriented Architecture , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[4] Fabio Casati,et al. Understanding Mashup Development , 2008, IEEE Internet Computing.
[5] Jeho Nam,et al. A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[6] Steganography Steganography,et al. An Analysis of Steganographic Techniques , 1998 .
[7] Xiang Zuo,et al. Integration WebGIS with AJAX and XML Based on Google Maps , 2008, 2008 First International Conference on Intelligent Networks and Intelligent Systems.
[8] Declan Butler,et al. Mashups mix data into global service , 2006, Nature.
[9] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[10] Vipul Kashyap,et al. Semantic heterogeneity in global information systems: The role of metadata , 1996 .
[11] Xiamu Niu,et al. A Shape-Preserving Method for Watermarking 2D Vector Maps Based on Statistic Detection , 2006, IEICE Trans. Inf. Syst..
[12] Chao-Hung Lin,et al. A High Capacity 3D Steganography Algorithm , 2009, IEEE Transactions on Visualization and Computer Graphics.
[13] James M. Turner. Data about metadata: beating the Metamap into shape , 2004 .
[14] Christoph Busch,et al. Reversible watermarking of 2D-vector data , 2004, MM&Sec '04.
[15] Danyel Fisher,et al. Hotmap: Looking at Geographic Attention , 2007, IEEE Transactions on Visualization and Computer Graphics.
[16] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[17] Eija Kaasinen,et al. User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.
[18] Xiamu Niu,et al. Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion , 2007, IEEE Transactions on Information Forensics and Security.
[19] Amit P. Sheth,et al. Overview on Using Metadata to manage Multimedia Data , 1998, Multimedia Data Management.
[20] M. C. Jones,et al. Mash-ups and CSCW : opportunities and issues , 2006 .
[21] Chung-Ming Wang,et al. Steganography on point-sampled geometry , 2006, Comput. Graph..
[22] Martin Isenburg,et al. (Guest Editors) , 2022 .
[23] Roger Frost,et al. International Organization for Standardization (ISO) , 2004 .