|
data compression (1) | data hiding (4) | Data security (1) |
data-hiding (80) | DCT (1) | decision feedback equalization (1) |
decoupled parameters (1) | Deep Learning (3) | defacto standard (1) |
Degradation (1) | delay spread (1) | design methodology (1) |
desynchronization (1) | detection diversity (1) | Digital Communications (33) |
digital data protection (1) | digital image forensics (1) | digital media forensics (1) |
digital photo (1) | Digital Television (2) | dirty paper (2) |
dirty paper coding (1) | disclosure attacks (1) | discrete cosine transform (2) |
discrete cosine transforms (2) | Distortion (1) | distortion correction (1) |
Distortion Optimization (1) | distributed estimation (3) | distributed local Kalman filtering (1) |
distributed source coding (1) | distributed tracking (1) | distributed tracking with consensus (1) |
dither modulation (1) | DNA (1) | DNN watermarking (1) |
DOA estimation (1) | Document image (1) | Doppler effect (1) |
Doppler frequencies (1) | double compression detection (2) | Double JPEG compression (1) |
Doubly stochastic model (1) | DS-SS (1) | DSL (2) |
Dual lattice (1) | dummies (1) | DVB (1) |
DVB-S (3) | dynacs (62) | dynamic spectrum access (2) |
dynamic spectrum leasing (2) | dynamic spectrum sharing (1) | |