標(biāo)題: Titlebook: Digital-Forensics and Watermarking; 12th International W Yun Qing Shi,Hyoung-Joong Kim,Fernando Pérez-Gonzá Conference proceedings 2014 Spr [打印本頁] 作者: 作業(yè) 時間: 2025-3-21 18:30
書目名稱Digital-Forensics and Watermarking影響因子(影響力)
書目名稱Digital-Forensics and Watermarking影響因子(影響力)學(xué)科排名
書目名稱Digital-Forensics and Watermarking網(wǎng)絡(luò)公開度
書目名稱Digital-Forensics and Watermarking網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Digital-Forensics and Watermarking被引頻次
書目名稱Digital-Forensics and Watermarking被引頻次學(xué)科排名
書目名稱Digital-Forensics and Watermarking年度引用
書目名稱Digital-Forensics and Watermarking年度引用學(xué)科排名
書目名稱Digital-Forensics and Watermarking讀者反饋
書目名稱Digital-Forensics and Watermarking讀者反饋學(xué)科排名
作者: 屈尊 時間: 2025-3-21 21:00 作者: HIKE 時間: 2025-3-22 03:22
Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited can resist blind steganalysis but is vulnerable to the targeted attack proposed by Tan .. In this paper, we introduce an improved version of APVD. Like APVD, we also first divide an image into some non-overlapping squares and then rotate each of them by a random degree of 0, 90, 180 or 270. For an 作者: 英寸 時間: 2025-3-22 06:39 作者: MOAT 時間: 2025-3-22 09:44 作者: Accede 時間: 2025-3-22 14:12
Improved Tagged Visual Cryptograms by Using Random Gridsfolding up each single share, the associated tagged pattern is visually revealed. Such additional tag patterns greatly enrich extra abilities of VC, such as augmented message carried in a single share, user-friendly interface to manage the shares, and/or evidence for verifying consistency among thos作者: Accede 時間: 2025-3-22 20:53 作者: lesion 時間: 2025-3-22 22:01 作者: 蒙太奇 時間: 2025-3-23 03:49
Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusionosed scheme is designed to share a secret binary image, such as text image or natural image, into . EDBTC-compressed images including meaningful contents. The compressed shadows generated by our proposed scheme have good visual quality and no pixel expansion, which are beneficial to reduce suspicion作者: GRIPE 時間: 2025-3-23 09:00
Reversible Data Hiding in Encrypted H.264/AVC Video Streams this paper, a reversible data hiding scheme in encrypted H.264/AVC video streams is proposed. During H.264/AVC encoding, the intra-prediction mode (IPM), motion vector difference (MVD), and residue coefficients’ signs are encrypted using a standard stream cipher. Then, the data-hider, who does not 作者: cardiopulmonary 時間: 2025-3-23 09:51 作者: BLANK 時間: 2025-3-23 17:38
Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibrationpropose a novel feature set to detect NA-DJPEG compression based on refined intensity difference (RID), a new measure for blocking artifacts. Refined intensity difference is essentially intensity difference with compensation, which takes the negative effect of image texture into consideration when m作者: Fecundity 時間: 2025-3-23 18:03
A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern sharpening which aims to enhance the image edge contrast for a clear view is considered to be one of the most fundamental editing techniques. However, only a few works have been reported on the detection of image sharpening. From a perspective of texture analysis, the over-shoot artifact caused by 作者: amyloid 時間: 2025-3-24 01:21 作者: 小故事 時間: 2025-3-24 02:50 作者: 周興旺 時間: 2025-3-24 06:31
Conference proceedings 2014ld in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hidi作者: 無動于衷 時間: 2025-3-24 14:22 作者: 民間傳說 時間: 2025-3-24 15:56 作者: terazosin 時間: 2025-3-24 20:32
M. Victoria Moreno-Arribas,M. Carmen Polo proposed method can solve the pixel expansion and code book needed problems. Further, better visual quality of both the recovered secret image and reconstructed tag image is provided according to the theoretical analysis and demonstrated experiments.作者: 無能的人 時間: 2025-3-25 03:09 作者: 設(shè)想 時間: 2025-3-25 06:15
Steganalysis of Compressed Speech Based on Markov and Entropytional entropy features of the track pulses are extracted; a support vector machine (SVM) is then applied to the features for discovering the existence of hidden data in compressed speech signals, respectively. Some famous CDBS methods on ACELP encoded speech are considered. Experimental results have proven the effectiveness of the two methods.作者: 茁壯成長 時間: 2025-3-25 11:34 作者: 最高點 時間: 2025-3-25 13:55 作者: 高貴領(lǐng)導(dǎo) 時間: 2025-3-25 17:07
Maurizio Ugliano,Paul A. Henschkes the recovering process is simple and fast. In addition, EDBTC-compressed images instead of the original format images are selected as shadows, which can improve the efficiency for data transmission and storing. The experimental results demonstrate that the proposed scheme offers a high secure and effective mechanism for secret image sharing.作者: 描述 時間: 2025-3-25 22:29
Richard Marchal,Philippe Jeandetts. With an encrypted video containing hidden data, data extraction can be carried out either in encrypted or decrypted domain. In addition, real reversibility is realized, that is, data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.作者: entrance 時間: 2025-3-26 03:28 作者: LARK 時間: 2025-3-26 06:55 作者: Boycott 時間: 2025-3-26 10:09
Reversible Data Hiding in Encrypted H.264/AVC Video Streamsts. With an encrypted video containing hidden data, data extraction can be carried out either in encrypted or decrypted domain. In addition, real reversibility is realized, that is, data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.作者: 極大的痛苦 時間: 2025-3-26 15:12 作者: analogous 時間: 2025-3-26 18:37 作者: arrogant 時間: 2025-3-26 22:59 作者: 鳥籠 時間: 2025-3-27 01:55
Amino Acids and Biogenic AminesGS to PVCS is proved and shown by means of giving theoretical analysis and conducting some specific schemes. The relationship between codebook and computational complexity are analyzed for PVCS and RGS. Furthermore, the contrast of PVCS is no less than the one of RGS under the same access structure, which is shown by experimental results.作者: 難理解 時間: 2025-3-27 05:45
What Sustains Life? An Overview,imate performance when both the investigator and the forger have complete information. Finally, for a more practical scenario that one of the parties has incomplete information, a Bayesian game is introduced and the ultimate performance is compared with that of complete information game.作者: 高興去去 時間: 2025-3-27 13:06
0302-9743 l-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis作者: cardiopulmonary 時間: 2025-3-27 16:44
Cheating Immune Block-Based Progressive Visual Cryptography which any two dishonest participants might collude together to tamper their image blocks shared with other honest participants. Also, they can impersonate an honest participant to force other honest participants to reconstruct the wrong secret. In this paper, we solve the cheating problem and propose a cheating immune (2, .)-BPVCS.作者: capsaicin 時間: 2025-3-27 21:10
Visual Cryptography and Random Grids SchemesGS to PVCS is proved and shown by means of giving theoretical analysis and conducting some specific schemes. The relationship between codebook and computational complexity are analyzed for PVCS and RGS. Furthermore, the contrast of PVCS is no less than the one of RGS under the same access structure, which is shown by experimental results.作者: 臆斷 時間: 2025-3-28 00:32
Camera Source Identification Game with Incomplete Informationimate performance when both the investigator and the forger have complete information. Finally, for a more practical scenario that one of the parties has incomplete information, a Bayesian game is introduced and the ultimate performance is compared with that of complete information game.作者: 顛簸地移動 時間: 2025-3-28 05:03
Bitspotting: Detecting Optimal Adaptive Steganographyher to consider all positions. We give defining formulas for each player’s best response strategy and minimax strategy; and we present additional structural constraints on the game’s equilibria. For the special case of length-two binary sequences, we compute explicit equilibria and provide numerical作者: 匍匐前進 時間: 2025-3-28 06:50
Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithmr. Experimental results demonstrate that our improved EAMR (I-EAMR) can efficiently defeat the targeted steganalyzer presented by Tan .. [.]. Furthermore, it can still preserve the statistics of the carrier image well enough to resist today’s blind steganalyzers.作者: 失敗主義者 時間: 2025-3-28 12:55 作者: cataract 時間: 2025-3-28 16:07
Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration on image texture and more discriminative, we calibrate it by a reference feature vector to generate a calibrated RID (C-RID) feature vector for final binary classification. Experiments have been conducted to validate the effectiveness of the C-RID feature set, and the results have shown that it out作者: 越自我 時間: 2025-3-28 19:52 作者: 自傳 時間: 2025-3-29 01:24 作者: Adjourn 時間: 2025-3-29 05:25
Heroes in Medical History ab[Abstracther to consider all positions. We give defining formulas for each player’s best response strategy and minimax strategy; and we present additional structural constraints on the game’s equilibria. For the special case of length-two binary sequences, we compute explicit equilibria and provide numerical作者: amyloid 時間: 2025-3-29 10:49 作者: Anecdote 時間: 2025-3-29 13:03
Biochemistry of Alcoholic Fermentation the PSNR of image with histogram-pair based reversible data hiding by using RZL is higher than that without using RZL as the embedding data rate is not high. Zhang et al.’s RZL is better than Wong et al.’s in most cases. The average PSNR gain is about 1?dB for five test images at different payloads作者: Pseudoephedrine 時間: 2025-3-29 16:59 作者: Repatriate 時間: 2025-3-29 20:58 作者: 輕浮思想 時間: 2025-3-30 03:24
What Sustains Life? An Overview,-privacy fingerprinting algorithm based on that model. The model not only protects sensitive personal information against collusion attacks but also allows data providers to republish their updated original data without degrading the privacy protection. The algorithm embeds fingerprints in the gener作者: 伸展 時間: 2025-3-30 07:20 作者: Biguanides 時間: 2025-3-30 08:24 作者: Presbycusis 時間: 2025-3-30 15:56 作者: 炸壞 時間: 2025-3-30 19:03
Yun Qing Shi,Hyoung-Joong Kim,Fernando Pérez-GonzáIncludes supplementary material: 作者: Gorilla 時間: 2025-3-30 23:14 作者: 積極詞匯 時間: 2025-3-31 02:56
Heroes in Medical History ab[Abstractength . in a binary sequence, and Eve wants to detect whether a secret message is present. The individual positions of all binary sequences are independently distributed, but have different levels of predictability. Using knowledge of this distribution, Alice randomizes over all possible size-. subs作者: 無可非議 時間: 2025-3-31 05:13
Whose Syndrome? Stories of Medical Eponymsto those consecutive pixel pairs whose absolute difference of grey values are larger than or equal to a threshold .. Tan .. [.] pointed out that since those adjacent pixel pairs can be located by the potential attackers, the pulse distortion introduced in the histogram of absolute difference of pixe作者: glacial 時間: 2025-3-31 10:17 作者: cringe 時間: 2025-3-31 14:36
Heroes in Medical History ab[Abstracteganalysis has made rapid progress recently. That is, more advanced statistical models often utilizing high dimensional features have been adopted. It is noted that there is one thing in common for all of these newly developed advanced steganalytic schemes. That is, uniform quantization has been app作者: 情感脆弱 時間: 2025-3-31 18:05
Whose Syndrome? Stories of Medical Eponymsteganalysis against this kind of audio steganography. In this paper, we introduce two methods to detect various CDBS on ACELP speech. One is the Markov method and the other is the entropy method. Both methods are based on the observation that the steganography behavior has certain effects on the rel作者: Eeg332 時間: 2025-3-31 23:26