派博傳思國際中心

標(biāo)題: Titlebook: Digital Forensics and Watermarking; 15th International W Yun Qing Shi,Hyoung Joong Kim,Feng Liu Conference proceedings 2017 Springer Intern [打印本頁]

作者: Hayes    時間: 2025-3-21 18:48
書目名稱Digital Forensics and Watermarking影響因子(影響力)




書目名稱Digital Forensics and Watermarking影響因子(影響力)學(xué)科排名




書目名稱Digital Forensics and Watermarking網(wǎng)絡(luò)公開度




書目名稱Digital Forensics and Watermarking網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Digital Forensics and Watermarking被引頻次




書目名稱Digital Forensics and Watermarking被引頻次學(xué)科排名




書目名稱Digital Forensics and Watermarking年度引用




書目名稱Digital Forensics and Watermarking年度引用學(xué)科排名




書目名稱Digital Forensics and Watermarking讀者反饋




書目名稱Digital Forensics and Watermarking讀者反饋學(xué)科排名





作者: 驚呼    時間: 2025-3-21 21:25
https://doi.org/10.1007/978-1-4614-8193-5gnal. ODG and SDG analysis are performed on both the original and watermarked signal and the results signify the efficiency of the proposed scheme. Moreover, some signal processing operations are finally carried out on the watermarked signal and the outcome was intriguing as all attacks are countera
作者: Pantry    時間: 2025-3-22 02:38

作者: 下邊深陷    時間: 2025-3-22 04:58
Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authenticationgnal. ODG and SDG analysis are performed on both the original and watermarked signal and the results signify the efficiency of the proposed scheme. Moreover, some signal processing operations are finally carried out on the watermarked signal and the outcome was intriguing as all attacks are countera
作者: 挫敗    時間: 2025-3-22 09:03

作者: 暗指    時間: 2025-3-22 14:08

作者: 暗指    時間: 2025-3-22 20:33

作者: defuse    時間: 2025-3-22 23:01
Jewellord Nem Singh,France Bourgouin and time-saving countermeasure against video-based face spoofing attacks based on LBP (Local Binary Patterns) and multiscale DCT (Discrete Cosine Transform) is proposed. Adopted as the low-level descriptors, LBP features are used to extract spatial information in each selected frame. Next, multisca
作者: 1分開    時間: 2025-3-23 02:12

作者: 豐滿中國    時間: 2025-3-23 06:37

作者: nonsensical    時間: 2025-3-23 11:09
Sleep Mode for Power Saving Class Type IItion Residual Distribution (PRED) analysis is proposed in the paper. The proposed scheme can be applied to detect double H.264 compression with non-aligned GOP structures. For each frame of a given video, the prediction residual is first calculated and the average value of the prediction residual in
作者: 有害    時間: 2025-3-23 15:08

作者: 遠(yuǎn)足    時間: 2025-3-23 19:33

作者: Ornament    時間: 2025-3-23 23:26
Fault Tolerance in MapReduce: A Surveyits content and eventually introduce side effect to the identification accuracy. In this paper, an effective source camera identification scheme based on guided image estimation and block weighted average is proposed. Before the SPN extraction, an adaptive SPN estimator based on image content is imp
作者: 粉筆    時間: 2025-3-24 05:01

作者: 漫步    時間: 2025-3-24 08:39
https://doi.org/10.1007/978-1-4614-8193-5However, it might be impossible to recover if lost, counterfeited or hacked, thereby ruining the general aim of securing it. In this paper, an 8-layered feature enhancement algorithm is proposed. A centroid based semi-fragile audio watermarking is used to conceal the enhanced fingerprint biometric d
作者: 枕墊    時間: 2025-3-24 13:11

作者: Mystic    時間: 2025-3-24 16:08
Pedro Vale Pinheiro,Fernando Boavidaontrast Limited Adaptive Histogram Equalization is proposed as a preprocessing stage in images. SURF is used to extract keypoints from the preprocessed image. Even in flat regions, the method can also extract enough keypoints. In the matching stage, g2NN matching skill is used which can also detect
作者: Astigmatism    時間: 2025-3-24 22:28
https://doi.org/10.1007/978-3-319-06704-9content. In this paper, we present a local derivative pattern (LDP) based forensic framework to detect if a digital image has been processed by seam carving or not. Each image is firstly encoded by applying four LDP encoders. Afterward, 96-D features are extracted from the encoded LDP images, and th
作者: CT-angiography    時間: 2025-3-25 01:18

作者: Enthralling    時間: 2025-3-25 05:44
P. Savithri,R. Perumal,R. Nagarajanerminals should not be ignored as well. In this paper, we investigate the color mixture model of a well-known psychophysical phenomenon: “persistence of vision”, and propose a new display technology which presents secret and cheating information at the same time. Unauthorized viewers only see the ch
作者: 變白    時間: 2025-3-25 10:36
V. Balasubramanian,J. K. Ladha,G. L. Denning design. However, most of the previous RG-based threshold VSS still suffer from low visual quality or worse reconstructed secrets when more shares are stacked. In this paper, a new RG-based VSS with improved visual quality is proposed. The random bits are utilized to improve the visual quality as we
作者: Colonnade    時間: 2025-3-25 12:59
Resource Management and Transport Layer information. In this paper, we propose a (.,?.)-HVCS using complementary cover images. Before the halftone processing of the cover images by error diffusion, secret information pixels (SIPs) are prefixed based on the underlying (.,?.)-VCS. In the halftone processing, several pairs of complementary
作者: RENIN    時間: 2025-3-25 17:49

作者: 潰爛    時間: 2025-3-25 23:45

作者: 指數(shù)    時間: 2025-3-26 00:43
978-3-319-53464-0Springer International Publishing AG 2017
作者: 消散    時間: 2025-3-26 07:50
Digital Forensics and Watermarking978-3-319-53465-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 倔強(qiáng)一點    時間: 2025-3-26 08:59
Using Benford’s Law Divergence and Neural Networks for Classification and Source Identification of B Benford’s law are used as input features for a Neural Network for the classification and source identification of biometric images. Experimental analysis shows that the classification and identification of the source of the biometric images can achieve good accuracies between the range of 90.02% and 100%.
作者: STELL    時間: 2025-3-26 13:37

作者: Cabg318    時間: 2025-3-26 19:35
Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality stacked. In this paper, a new RG-based VSS with improved visual quality is proposed. The random bits are utilized to improve the visual quality as well as to decrease the darkness of the reconstructed secret image in the proposed scheme. Experimental results and analyses show the effectiveness of the proposed scheme.
作者: 小隔間    時間: 2025-3-26 22:16

作者: GEM    時間: 2025-3-27 04:50
Suejb Memeti,Sabri Pllana,Joanna Ko?odziejNetworks structure and Laplacian filter is used in the signal enhancement layer. We test the proposed method on four kinds of small-size image databases. The experimental results have demonstrate that the proposed algorithm is effective. The detection accuracies for different image size database are all above?95%.
作者: single    時間: 2025-3-27 07:44
P. Savithri,R. Perumal,R. Nagarajanstance between the two liquid crystal layers, the size of the visible space can be controlled in such a way that larger distance will result in a smaller visible space, while smaller distance will result in a larger visible space.
作者: 一窩小鳥    時間: 2025-3-27 12:03

作者: 朝圣者    時間: 2025-3-27 15:01
Resource Management and Transport Layercover images are adopted and two halftone methods on the cover images are designed for different (.,?.) threshold access structures. The proposed scheme removes the share’s cross interference from other shares and obtains better visual quality. Furthermore, the proposed scheme eliminates the burden that each participant may carry multiple shares.
作者: 永久    時間: 2025-3-27 19:36

作者: EXCEL    時間: 2025-3-28 00:38

作者: Injunction    時間: 2025-3-28 04:20

作者: 剝削    時間: 2025-3-28 08:23

作者: 把…比做    時間: 2025-3-28 13:22

作者: 摘要    時間: 2025-3-28 15:40

作者: 小歌劇    時間: 2025-3-28 21:53

作者: 人類的發(fā)源    時間: 2025-3-29 02:03
International Political Economy SeriesN-SDF, respectively. To the best of our knowledge, it is the first attempt to comprehensively define the self-noise of cell-phone and furthermore apply it to source identification issue of audio forensics.
作者: 遭受    時間: 2025-3-29 07:07
Sleep Mode for Power Saving Class Type Icted as acoustic features, and then Support vector machine (SVM) classifiers are used to separate disguised voices from original voices. Experimental results verify the excellent performance of the proposed scheme in the noisy environment.
作者: PLIC    時間: 2025-3-29 07:38

作者: GULF    時間: 2025-3-29 14:10
Ruonan Zhang,Lin Cai,Jianping Panoach can effectively solve the inaccurate locating problem caused by outliers. It also performs better than reference algorithm in locating spliced regions, especially for those with realistic appearances, and improves the robustness effectively.
作者: visceral-fat    時間: 2025-3-29 16:21

作者: barium-study    時間: 2025-3-29 23:26

作者: 不能強(qiáng)迫我    時間: 2025-3-30 01:59

作者: 空中    時間: 2025-3-30 06:48

作者: sebaceous-gland    時間: 2025-3-30 09:37
A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimationoach can effectively solve the inaccurate locating problem caused by outliers. It also performs better than reference algorithm in locating spliced regions, especially for those with realistic appearances, and improves the robustness effectively.
作者: 我吃花盤旋    時間: 2025-3-30 13:17

作者: 臭了生氣    時間: 2025-3-30 19:28

作者: osteocytes    時間: 2025-3-31 00:30
Pedro Vale Pinheiro,Fernando Boavidad image. Even in flat regions, the method can also extract enough keypoints. In the matching stage, g2NN matching skill is used which can also detect multiple forgeries. The experimental results show that the proposed method performs better than the state-of-the-art algorithms on the public database.
作者: 整理    時間: 2025-3-31 04:52
V. Balasubramanian,J. K. Ladha,G. L. Denning stacked. In this paper, a new RG-based VSS with improved visual quality is proposed. The random bits are utilized to improve the visual quality as well as to decrease the darkness of the reconstructed secret image in the proposed scheme. Experimental results and analyses show the effectiveness of the proposed scheme.
作者: 機(jī)構(gòu)    時間: 2025-3-31 07:06
Recapture Image Forensics Based on Laplacian Convolutional Neural NetworksNetworks structure and Laplacian filter is used in the signal enhancement layer. We test the proposed method on four kinds of small-size image databases. The experimental results have demonstrate that the proposed algorithm is effective. The detection accuracies for different image size database are all above?95%.
作者: SHOCK    時間: 2025-3-31 11:51
Privacy Monitorstance between the two liquid crystal layers, the size of the visible space can be controlled in such a way that larger distance will result in a smaller visible space, while smaller distance will result in a larger visible space.
作者: SUE    時間: 2025-3-31 16:25

作者: Jargon    時間: 2025-3-31 21:16

作者: Hiatus    時間: 2025-4-1 00:07

作者: MAZE    時間: 2025-4-1 05:23
A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networksl the traces that forensics based on, some farsighted forgers take advantage of so-called anti-forensics to make their forgery more convincing. To rebuild the credibility of forensics, many countermeasures against anti-forensics have been proposed. This paper presents a multi-purpose approach to det




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
普兰县| 兴城市| 陕西省| 环江| 政和县| 大港区| 思茅市| 巨野县| 巴中市| 连江县| 琼结县| 临邑县| 乌鲁木齐市| 玛多县| 淄博市| 小金县| 融水| 密云县| 乐安县| 阜新| 萍乡市| 云阳县| 稻城县| 宜兰市| 达拉特旗| 肥城市| 富宁县| 通渭县| 张北县| 金坛市| 张家港市| 海丰县| 河池市| 高雄县| 开远市| 慈利县| 江门市| 原阳县| 新乡县| 勃利县| 敦化市|