標(biāo)題: Titlebook: Cloud Computing and Security; Second International Xingming Sun,Alex Liu,Elisa Bertino Conference proceedings 2016 Springer International P [打印本頁] 作者: supplementary 時(shí)間: 2025-3-21 18:21
書目名稱Cloud Computing and Security影響因子(影響力)
書目名稱Cloud Computing and Security影響因子(影響力)學(xué)科排名
書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度
書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cloud Computing and Security被引頻次
書目名稱Cloud Computing and Security被引頻次學(xué)科排名
書目名稱Cloud Computing and Security年度引用
書目名稱Cloud Computing and Security年度引用學(xué)科排名
書目名稱Cloud Computing and Security讀者反饋
書目名稱Cloud Computing and Security讀者反饋學(xué)科排名
作者: antidepressant 時(shí)間: 2025-3-21 23:45
On Improving Homomorphic Encryption-Based Reversible Data Hidingfectly extracted as well. Optimal visual quality and improved embedding rate are obtained by the proposed approach, since the value of the directly decrypted unit is the same as the original one. Experimental results and comparisons are demonstrated to illustrate the effectiveness and advantages of the proposed method.作者: 圓桶 時(shí)間: 2025-3-22 01:00 作者: 柔軟 時(shí)間: 2025-3-22 08:24
Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Codingmbedded for content recovery. Also, the relationship between each image block and each reference bit is built so that the recoverable area for tampered image can be increased. Experimental results demonstrate the effectiveness of the proposed scheme.作者: GEST 時(shí)間: 2025-3-22 09:46
Schur Decomposition Based Robust Watermarking Algorithm in Contourlet Domaintion in the Contourlet domain. Consequently, the watermark is embedded into those stable features with QIM method. Experimental results show that the proposed scheme has some superiorities in terms of robustness and imperceptibility, which could against most common attacks such as JPEG compression, filtering, cropping, noise adding and so on.作者: abstemious 時(shí)間: 2025-3-22 15:13 作者: abstemious 時(shí)間: 2025-3-22 19:07
https://doi.org/10.1007/978-3-642-53107-1distinguish natural and hidden carrier, and then select the optimal subset. The analysis directs at the mainstream universal steganalysis model–SPAM model, and the simulation results show that optimal subset has a good detection and low computational complexity.作者: 舊石器時(shí)代 時(shí)間: 2025-3-22 22:04 作者: 牙齒 時(shí)間: 2025-3-23 05:24 作者: abreast 時(shí)間: 2025-3-23 08:54
Schnitzler und der Sp?trealismusg data. Finally, the secret information can be sent to the receiver without any modification of the stego-texts. The proposed algorithm has a higher theoretical significance and practice value because it is robust for almost all current steganalysis methods.作者: 五行打油詩 時(shí)間: 2025-3-23 11:57 作者: CLOT 時(shí)間: 2025-3-23 17:13
Improved Uniform Embedding for Efficient JPEG Steganographyverified with the state-of-the-art steganalyzer - JRM on the BOSSbase database. Compared with prior arts, the proposed scheme gains favorable performance in terms of secure embedding capacity against steganalysis.作者: 簡略 時(shí)間: 2025-3-23 20:18 作者: Confess 時(shí)間: 2025-3-24 01:20
Coverless Text Information Hiding Method Based on the Word Rank Mapg data. Finally, the secret information can be sent to the receiver without any modification of the stego-texts. The proposed algorithm has a higher theoretical significance and practice value because it is robust for almost all current steganalysis methods.作者: expository 時(shí)間: 2025-3-24 05:23
Kaiser,Gerhard Oehler (apl. Professor)art is co-occurrence matrices features. Due to its high dimensionality, we make the best of the label to reduce these features. Compared with state-of-the-arts methods, the most advantage of this proposed steganalysis features is its lower detection error while meeting the advanced steganographic algorithms.作者: 匯總 時(shí)間: 2025-3-24 08:18 作者: Pudendal-Nerve 時(shí)間: 2025-3-24 13:31
Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matricesart is co-occurrence matrices features. Due to its high dimensionality, we make the best of the label to reduce these features. Compared with state-of-the-arts methods, the most advantage of this proposed steganalysis features is its lower detection error while meeting the advanced steganographic algorithms.作者: 發(fā)酵 時(shí)間: 2025-3-24 16:10 作者: inventory 時(shí)間: 2025-3-24 23:02
0302-9743 ngs of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016..The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding,作者: Lipoma 時(shí)間: 2025-3-25 00:39 作者: 畏縮 時(shí)間: 2025-3-25 04:20 作者: 平庸的人或物 時(shí)間: 2025-3-25 10:07 作者: 夸張 時(shí)間: 2025-3-25 13:41
A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping a family of time-varying periodic convolutional codes, the parity-check matrix is constructed by matrix unwarpping. The proposed scheme can enhance the parameter recognition of STCs efficiently while maintaining similar performance with STCs. Moreover, their construction method is more systematic.作者: negotiable 時(shí)間: 2025-3-25 18:40 作者: 低位的人或事 時(shí)間: 2025-3-25 20:46
Conference proceedings 2016nd selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics..作者: Thyroxine 時(shí)間: 2025-3-26 02:35 作者: parasite 時(shí)間: 2025-3-26 05:26
,Konstruktionsrichtlinien für Stanzen,d image. On the other end, we extract side information from the processed image and reconstruct the original content without any error. Experimental results show that good contrast and good quality can be achieved in the RCE processed image.作者: accordance 時(shí)間: 2025-3-26 09:11
Kaiser,Gerhard Oehler (apl. Professor)fectly extracted as well. Optimal visual quality and improved embedding rate are obtained by the proposed approach, since the value of the directly decrypted unit is the same as the original one. Experimental results and comparisons are demonstrated to illustrate the effectiveness and advantages of the proposed method.作者: 不整齊 時(shí)間: 2025-3-26 15:57 作者: 退潮 時(shí)間: 2025-3-26 19:22 作者: caldron 時(shí)間: 2025-3-26 21:48
Das Schleifen von Schnittwerkzeugen,tion in the Contourlet domain. Consequently, the watermark is embedded into those stable features with QIM method. Experimental results show that the proposed scheme has some superiorities in terms of robustness and imperceptibility, which could against most common attacks such as JPEG compression, filtering, cropping, noise adding and so on.作者: 燒瓶 時(shí)間: 2025-3-27 05:08 作者: lactic 時(shí)間: 2025-3-27 09:07 作者: 尖牙 時(shí)間: 2025-3-27 11:41
https://doi.org/10.1007/978-3-319-48671-0authentication; cloud computing; mobile and wireless security; security protocols; theory of database pr作者: 痛得哭了 時(shí)間: 2025-3-27 14:55
978-3-319-48670-3Springer International Publishing AG 2016作者: Hyperalgesia 時(shí)間: 2025-3-27 20:05
Xingming Sun,Alex Liu,Elisa BertinoIncludes supplementary material: 作者: 切掉 時(shí)間: 2025-3-27 22:02 作者: narcotic 時(shí)間: 2025-3-28 03:18
,Konstruktionsrichtlinien für Stanzen,ng watermark, the generation principle and distribution features of direct current (DC) coefficient are utilized to directly modify the pixel values in the spatial domain, then 4 different sub-watermarks are embedded into different areas of the host image for four times, respectively. When extractin作者: Optometrist 時(shí)間: 2025-3-28 08:09 作者: 吹氣 時(shí)間: 2025-3-28 11:14 作者: 安定 時(shí)間: 2025-3-28 18:07
Schnitt≈, Stanz≈ und Ziehwerkzeugetream, thus the imperceptibility and security will be decreased. In order to solve this problem, a reversible data hiding algorithm with low bit-rate growth in H.264/AVC compressed video by adaptive hybrid coding is proposed in this paper. In the proposed scheme, the hybrid coding algorithm has been作者: Deject 時(shí)間: 2025-3-28 21:56
Schnitt≈, Stanz≈ und Ziehwerkzeugerences of intra prediction modes was proposed. During the process of 4?×?4 luminance prediction coding, we establish a mapping relationship between secret bits and differences of two consecutive intra predictions with directions and embed secret bits by modulating the prediction modes according to L作者: ARENA 時(shí)間: 2025-3-29 00:20
https://doi.org/10.1007/978-3-642-53107-1n time and space domain. So maintain the level of detection rates, and reduce the dimension of features at the same time, have significance in research of steganalysis. This paper determines the optimal dimension of feature vectors by principal component analysis; using the concept of Fisher linear 作者: lymphoma 時(shí)間: 2025-3-29 06:56 作者: SEMI 時(shí)間: 2025-3-29 09:04
Das Schleifen von Schnittwerkzeugen,the separable reversible data hiding method in encrypted image, which makes it possible for cloud server to extract the additional data without knowing the original content. In this paper, we focus on the user side and introduced two improved methods based on neighborhood prediction to obtain the go作者: Enthralling 時(shí)間: 2025-3-29 14:55
,Konstruktionsrichtlinien für Stanzen,o the constructed binary map and two reconstruction levels, each non-overlapping block in original image can be compressed with the AMBTC algorithm. Then, after scrambling, the compression codes are extended through a random matrix, which can introduce more redundancy into the reference bits to be e作者: CLIFF 時(shí)間: 2025-3-29 16:04 作者: restrain 時(shí)間: 2025-3-29 23:44 作者: Spangle 時(shí)間: 2025-3-30 01:54 作者: Inoperable 時(shí)間: 2025-3-30 07:38 作者: Cupping 時(shí)間: 2025-3-30 10:33 作者: cocoon 時(shí)間: 2025-3-30 15:22
,Kontexte: Einflüsse, Kontakte, Diskurse, on syndrome trellis structure of convolutional codes and the Viterbi algorithm. In this paper, a new construction scheme of STCs is proposed based on a family of time-varying periodic convolutional codes, the parity-check matrix is constructed by matrix unwarpping. The proposed scheme can enhance t作者: 散布 時(shí)間: 2025-3-30 16:50
Schnüffelsucht und Schnüfflerneuropathiemage and video, the embedding rate and capacity of text steganography algorithm is generally lower due to its low redundancy. A text steganography algorithm using single Ci-Pai of song poetry as a template and the embedding rate of it reaches 16.1?%. This paper presents a new text steganography algo作者: Focus-Words 時(shí)間: 2025-3-30 21:38
,Konstruktionsrichtlinien für Stanzen,roposed watermarking algorithm has good invisibility of watermark and strong robustness for many added attacks, e.g., JPEG compression, cropping, adding noise, etc. Comparison results also have shown the preponderances of the proposed algorithm.作者: 安裝 時(shí)間: 2025-3-31 02:03 作者: EVADE 時(shí)間: 2025-3-31 06:28
Coverless Information Hiding Method Based on Multi-keywords作者: acclimate 時(shí)間: 2025-3-31 12:37
A Blind Image Watermarking Algorithm in the Combine Domainroposed watermarking algorithm has good invisibility of watermark and strong robustness for many added attacks, e.g., JPEG compression, cropping, adding noise, etc. Comparison results also have shown the preponderances of the proposed algorithm.