派博傳思國(guó)際中心

標(biāo)題: Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit [打印本頁(yè)]

作者: 監(jiān)督    時(shí)間: 2025-3-21 19:30
書目名稱Cloud Computing and Security影響因子(影響力)




書目名稱Cloud Computing and Security影響因子(影響力)學(xué)科排名




書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度




書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cloud Computing and Security被引頻次




書目名稱Cloud Computing and Security被引頻次學(xué)科排名




書目名稱Cloud Computing and Security年度引用




書目名稱Cloud Computing and Security年度引用學(xué)科排名




書目名稱Cloud Computing and Security讀者反饋




書目名稱Cloud Computing and Security讀者反饋學(xué)科排名





作者: 只有    時(shí)間: 2025-3-22 00:03

作者: 清洗    時(shí)間: 2025-3-22 01:19
https://doi.org/10.1007/978-3-642-99726-6 a few degradations in terms of visual quality and keep a small variation in bit-rate increase. Experimental results have verified that the proposed method has no significant degradation in terms of visual quality (i.e., PSNR and SSIM) and indeed obtains a very small variation in bit-rate increase.
作者: Detain    時(shí)間: 2025-3-22 07:12
https://doi.org/10.1007/978-3-642-51986-4 extracting procedures are implemented via these basic interactions, in which texts, pictures, voices or videos are used as carriers. With the features of language diversification, common media, real-time in an instant message communication, the proposed steganography in this paper is flexible, secure and reliable.
作者: Preamble    時(shí)間: 2025-3-22 10:30

作者: 運(yùn)動(dòng)的我    時(shí)間: 2025-3-22 14:57
Threshold Proxy Re-encryption and Its Application in Blockchainoved secure by using the intractability of discrete logarithms. This paper presents a consortium blockchain access permission scheme, which is built on the threshold proxy re-encryption scheme. When a new node joins a consortium blockchain, an access permission is achieved by the agreement on other existing nodes, instead of a centralized CA.
作者: 運(yùn)動(dòng)的我    時(shí)間: 2025-3-22 19:43
A Data Hiding Scheme with High Quality for H.264/AVC Video Streams a few degradations in terms of visual quality and keep a small variation in bit-rate increase. Experimental results have verified that the proposed method has no significant degradation in terms of visual quality (i.e., PSNR and SSIM) and indeed obtains a very small variation in bit-rate increase.
作者: 匍匐前進(jìn)    時(shí)間: 2025-3-23 00:59

作者: 不能逃避    時(shí)間: 2025-3-23 03:11
A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hidifixed parameters predictors through simple arithmetic combination of its surroundings pixel, experimental results show that the proposed method can provide a sparser prediction-error image for data embedding, and thus improves the performance of RDH more effectively than those state-of-the-art error prediction algorithms.
作者: 閑蕩    時(shí)間: 2025-3-23 06:38

作者: 不知疲倦    時(shí)間: 2025-3-23 12:52

作者: 學(xué)術(shù)討論會(huì)    時(shí)間: 2025-3-23 17:38
Schnittanatomie des menschlichen Gehirnshe practicability evaluation, which is related to time and storage overhead, communication and computation overhead, and the statistical model demand. Experimental results on CAIDA dataset give an overview of the existing interval-based NFW schemes.
作者: Cocker    時(shí)間: 2025-3-23 20:28
https://doi.org/10.1007/978-3-663-07751-0he matrix. Finally, a new image will be synthesized from these estimated patches, the defects can be located by finding the difference between the original fabric image and the reconstructed image. Experimental results prove the validity and feasibility of the proposed NLRA algorithm.
作者: APNEA    時(shí)間: 2025-3-24 01:41

作者: 認(rèn)識(shí)    時(shí)間: 2025-3-24 03:42

作者: Nausea    時(shí)間: 2025-3-24 08:31

作者: SLING    時(shí)間: 2025-3-24 14:22
Conference proceedings 2018al intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics
作者: Intersect    時(shí)間: 2025-3-24 18:48
Conference proceedings 2018ng and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artifici
作者: allude    時(shí)間: 2025-3-24 20:31
Cloud Computing and Security978-3-030-00015-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: deciduous    時(shí)間: 2025-3-24 23:17

作者: Liberate    時(shí)間: 2025-3-25 05:02

作者: 凝結(jié)劑    時(shí)間: 2025-3-25 08:27
978-3-030-00014-1Springer Nature Switzerland AG 2018
作者: 親屬    時(shí)間: 2025-3-25 15:44

作者: 鋸齒狀    時(shí)間: 2025-3-25 19:22

作者: Daily-Value    時(shí)間: 2025-3-25 23:30
,Ausführung einzelner Stanzwerkzeuge,tures, while feature based on randomness test has derived little attention. In this paper, by segmenting ciphertexts and changing parameter of randomness test, we propose 54 features of ciphertext based on NIST’s 15 randomness tests. As a measure of these features, we choose support vector machine a
作者: 修飾語    時(shí)間: 2025-3-26 02:11

作者: 使入迷    時(shí)間: 2025-3-26 07:12

作者: GEST    時(shí)間: 2025-3-26 08:38

作者: Type-1-Diabetes    時(shí)間: 2025-3-26 14:07

作者: 意外    時(shí)間: 2025-3-26 20:15
Gehirnscheiben und Plastination,s and natural image. They present strong anisotropic features, especially on the text and graphics parts. It is well known that Spread Transform Dither Modulation(STDM) is more robust to re-quantization, such as JPEG compression, than regular Quantization Index Modulation(QIM). In this paper, we pro
作者: Processes    時(shí)間: 2025-3-26 23:36

作者: 啟發(fā)    時(shí)間: 2025-3-27 03:07
https://doi.org/10.1007/978-3-642-99726-66 multicast, this study proposes a novel covert communication model based on IPv6 multicast (MCv6). In this model, a multicast group, containing a large number of members across different subnets, is created to hide the receiver’s network ID, thereby achieving covert communications. To ensure the se
作者: intangibility    時(shí)間: 2025-3-27 08:22
https://doi.org/10.1007/978-3-642-99726-6edded into. In this paper, we combine matrix embedding with several assumptions to propose a novel data hiding method in H.264/AVC video stream. The assumptions can be exploited to analyse the propagation of intra-frame distortion. Namely, both matrix embedding and the given assumptions are used for
作者: 皺痕    時(shí)間: 2025-3-27 09:34

作者: jungle    時(shí)間: 2025-3-27 15:26
https://doi.org/10.1007/978-3-642-51986-4lps to simplify the steganography design. The steganography model enables the two communication parties to interact with each other, which enables the receiving end to get data by data prediction, and optimizes the steganography mechanism to take full advantage of the existing methods to implement m
作者: 民間傳說    時(shí)間: 2025-3-27 18:39

作者: 多骨    時(shí)間: 2025-3-27 23:33

作者: STENT    時(shí)間: 2025-3-28 04:33
https://doi.org/10.1007/978-3-663-07751-0he main contribution is threefold. First, the Laplacian distribution is proposed to model each naive video frame, referring to as the original frame; meanwhile the noisy frame, referring to as the one with adding Gaussian-distributed noise, is modeled using the Gaussian distribution. Second, we prop
作者: 出價(jià)    時(shí)間: 2025-3-28 06:56
https://doi.org/10.1007/978-3-663-07751-0, image characteristic of nonlocal self-similarity (NSS) is widely applied to image denoising due to its effectiveness. Actually, fabric defect detection can be considered as a problem that finds noises in an image. Based on the reason, we propose a simple yet effective method, namely nonlocal low r
作者: 可卡    時(shí)間: 2025-3-28 13:06
https://doi.org/10.1007/978-3-663-07997-2modification influences. However, their security performance behaves volatilely and is very sensitive to the heuristically designed parameters and the initial additive distortion function. To make a stable security performance and to further improve the embedding security, a novel model-based stegan
作者: Grasping    時(shí)間: 2025-3-28 18:38
https://doi.org/10.1007/978-3-663-07997-2logy to protect copyright information, and proposes a scheme utilizes the support vector machine (SVM) based on posterior probability and the optimized genetic algorithm (GA). Firstly, each training image is divided into sub-blocks of 8?*?8 pixels, and they are trained and classified by the SVM to o
作者: Carcinoma    時(shí)間: 2025-3-28 20:11
The Research of Cryptosystem Recognition Based on Randomness Test’s Return Valuecryptosystem recognition applications. And we also conduct further analysis: (a) analyze some features’ recognition performance, and find the relation of some feature’s recognition accuracies and cryptosystem. (b) compared with existed features, part of new features maintain high recognition accurac
作者: 會(huì)議    時(shí)間: 2025-3-28 23:26
VideoChain: Trusted Video Surveillance Based on Blockchain for Campusion scenario. The analysis shows that VideoChain is traceable and non-tampering, which can effectively ensure the credibility of video surveillance data. It also has good operational efficiency. This research is of great significance to enhance the trust between the government and citizens, which wi
作者: 阻止    時(shí)間: 2025-3-29 04:02
A Blind Quantization Watermarking Scheme for Screen Content Imager a wide variety of image contents, including texts, graphics, symbols, patterns, and natural images. Experiments show that our method has a good performance in term of robustness and better visual quality.
作者: 過分    時(shí)間: 2025-3-29 07:26

作者: venous-leak    時(shí)間: 2025-3-29 12:28

作者: ostrish    時(shí)間: 2025-3-29 17:40
A Multiple Watermarking Scheme for?Content Authentication of OOXML Format Documents synonym substitutions has a strong robustness against the attacks on formats and the content. However, the double fragile watermarking methods can sensitively perceive tampers in the content and formats of the watermarked document, and predict the type of tampers with capability of locating the tam
作者: sigmoid-colon    時(shí)間: 2025-3-29 22:30

作者: 暴露他抗議    時(shí)間: 2025-3-30 02:46

作者: IST    時(shí)間: 2025-3-30 07:03
A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GAmpared with the experimental results of other algorithms, the proposed scheme has better resistance against some common attacks, such as Histogram Equalization, Guassian Noise (0.04), Guassian Noise (0.05), JPEG (QF?=?50), Salt-pepper Noise (0.01).
作者: Blood-Clot    時(shí)間: 2025-3-30 10:17

作者: Promotion    時(shí)間: 2025-3-30 15:44

作者: Femish    時(shí)間: 2025-3-30 19:26
Gehirnscheiben und Plastination,r a wide variety of image contents, including texts, graphics, symbols, patterns, and natural images. Experiments show that our method has a good performance in term of robustness and better visual quality.
作者: Ardent    時(shí)間: 2025-3-30 21:37
https://doi.org/10.1007/978-3-642-99726-6possible packet-loss and other errors. Theoretical analysis and simulation results show that the proposed MCv6 model can provide good IPv6-based covert communications, efficiently reducing the probability of detection, and ensuring the security and reliability of the IPv6-based medium.
作者: sclera    時(shí)間: 2025-3-31 03:26

作者: Mitigate    時(shí)間: 2025-3-31 06:32

作者: Expand    時(shí)間: 2025-3-31 11:41

作者: propose    時(shí)間: 2025-3-31 15:59

作者: 名義上    時(shí)間: 2025-3-31 17:51
https://doi.org/10.1007/978-3-663-07997-2mpared with the experimental results of other algorithms, the proposed scheme has better resistance against some common attacks, such as Histogram Equalization, Guassian Noise (0.04), Guassian Noise (0.05), JPEG (QF?=?50), Salt-pepper Noise (0.01).




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
马公市| 麻城市| 山丹县| 太原市| 扶余县| 兴仁县| 彰化县| 丹棱县| 西乌珠穆沁旗| 柳州市| 金塔县| 泸水县| 龙游县| 英超| 富裕县| 永川市| 绍兴县| 白玉县| 肥乡县| 克山县| 吴江市| 柘城县| 师宗县| 嘉荫县| 葫芦岛市| 黄陵县| 鄂尔多斯市| 临汾市| 沭阳县| 寿光市| 湘潭市| 阳山县| 绵阳市| 高台县| 乡城县| 兴国县| 老河口市| 丽江市| 筠连县| 崇左市| 道孚县|