標題: Titlebook: Information Hiding; 14th International C Matthias Kirchner,Dipak Ghosal Conference proceedings 2013 Springer-Verlag Berlin Heidelberg 2013 [打印本頁] 作者: 吞食 時間: 2025-3-21 17:16
書目名稱Information Hiding影響因子(影響力)
書目名稱Information Hiding影響因子(影響力)學(xué)科排名
書目名稱Information Hiding網(wǎng)絡(luò)公開度
書目名稱Information Hiding網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Hiding被引頻次
書目名稱Information Hiding被引頻次學(xué)科排名
書目名稱Information Hiding年度引用
書目名稱Information Hiding年度引用學(xué)科排名
書目名稱Information Hiding讀者反饋
書目名稱Information Hiding讀者反饋學(xué)科排名
作者: 石墨 時間: 2025-3-21 22:30
Conference proceedings 2013in May 2012.The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on multimedia forensics and counter-forensics, steganalysis, data hiding in unusual content, steganography, covert channels, anonymity and privacy, watermarking, and fingerprinting.作者: finale 時間: 2025-3-22 00:25
978-3-642-36372-6Springer-Verlag Berlin Heidelberg 2013作者: refraction 時間: 2025-3-22 08:13
Information Hiding978-3-642-36373-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 后退 時間: 2025-3-22 12:35
Matthias Kirchner,Dipak GhosalFast-track conference proceedings.State-of-the-art research.Up-to-date results作者: Lacerate 時間: 2025-3-22 15:52
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465062.jpg作者: 總 時間: 2025-3-22 17:59
rner initiieren Organisationen wie Verb?nde (z.?B. British Quality Foundation), Forschungseinrichtungen und Weiterbildungsdienstleister (z.?B. Singularity University) spezielle Formate, in denen zukunftsgerichtete (meist technologische) Themen bearbeitet werden.作者: 分期付款 時間: 2025-3-23 00:08 作者: Encapsulate 時間: 2025-3-23 02:24 作者: 扔掉掐死你 時間: 2025-3-23 09:00 作者: MULTI 時間: 2025-3-23 10:51
Aveek Dutta,Dola Saha,Dirk Grunwald,Douglas Sickernitiieren Organisationen wie Verb?nde (z. B. British Quality Foundation), Forschungseinrichtungen und Weiterbildungsdienstleister (z. B. Singularity University) spezielle Formate, in denen zukunftsgerichtete (meist technologische) Themen bearbeitet werden.作者: Strength 時間: 2025-3-23 14:26 作者: Intersect 時間: 2025-3-23 20:48
George Danezis,Emilia K?spernitiieren Organisationen wie Verb?nde (z. B. British Quality Foundation), Forschungseinrichtungen und Weiterbildungsdienstleister (z. B. Singularity University) spezielle Formate, in denen zukunftsgerichtete (meist technologische) Themen bearbeitet werden.作者: curettage 時間: 2025-3-24 00:36 作者: 揉雜 時間: 2025-3-24 06:05
Shijun Xiangnitiieren Organisationen wie Verb?nde (z. B. British Quality Foundation), Forschungseinrichtungen und Weiterbildungsdienstleister (z. B. Singularity University) spezielle Formate, in denen zukunftsgerichtete (meist technologische) Themen bearbeitet werden.作者: 兵團 時間: 2025-3-24 10:14
Peijia Zheng,Jiwu Huangnitiieren Organisationen wie Verb?nde (z. B. British Quality Foundation), Forschungseinrichtungen und Weiterbildungsdienstleister (z. B. Singularity University) spezielle Formate, in denen zukunftsgerichtete (meist technologische) Themen bearbeitet werden.作者: interrupt 時間: 2025-3-24 14:04
Dion Boesten,Boris ?kori?ally all managers within the organization have been involved in some form of management development activity within the past two years, and the firm is seeking to establish coherent management and organizational development policies and programs to meet their current and future needs in this area. A作者: 說笑 時間: 2025-3-24 16:52 作者: 起皺紋 時間: 2025-3-24 22:03 作者: inflate 時間: 2025-3-25 02:40
Ling Du,Xiaochun Cao,Muhua Zhang,Huazhu FunkX.Design Thinking.Lego? Serious Play??.Business Model Canvas?.Neu in der 3. überarbeiteten und erweiterten Auflage.In den letzten Jahren sind die Themen Digitalisierung und kognitive bzw. künstliche Intellige978-3-658-25663-0作者: 終止 時間: 2025-3-25 03:53
Aggelos Kiayias,Alexander Russell,Narasimha ShashidharnkX.Design Thinking.Lego? Serious Play??.Business Model Canvas?.Neu in der 3. überarbeiteten und erweiterten Auflage.In den letzten Jahren sind die Themen Digitalisierung und kognitive bzw. künstliche Intellige978-3-658-25663-0作者: 聲音刺耳 時間: 2025-3-25 10:10
Chenglong Chen,Jiangqun Ni,Rongbin Huang,Jiwu Huang作者: 健談 時間: 2025-3-25 15:22 作者: Gnrh670 時間: 2025-3-25 16:41
Steganalysis of LSB Replacement Using Parity-Aware Featuresinary classifier can be built, its accuracy is markedly better in comparison with the best structural and WS detectors in both uncompressed images and in decompressed JPEGs. This improvement is especially significant for very small change rates. A simple feature selection algorithm is used to obtain作者: FRONT 時間: 2025-3-25 23:17
Key-Efficient Steganographys a rate of key length over message length that converges to 1 as .?→?∞; the previous best result [5] achieved a constant rate >?1 regardless of the security offered. In this sense, our protocol is the first truly key-length efficient steganographic system. Furthermore, in our protocol, we can permi作者: conception 時間: 2025-3-26 01:30 作者: 笨拙處理 時間: 2025-3-26 06:52 作者: 執(zhí) 時間: 2025-3-26 12:11
Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarkinglts for some standard test clips show that the non-integer output of predictor provides higher prediction performance, and the proposed NIPE scheme with the new predicting strategy can reduce the embedding distortion for the same payload.作者: Ergots 時間: 2025-3-26 13:36
Statistical Detection of LSB Matching Using Hypothesis Testing Theoryeighted Stego-image (WS) detector, a practical test is presented. A numerical comparison with state-of-the-art detectors shows the good performance of the proposed tests and highlights the relevance of the proposed methodology.作者: Accord 時間: 2025-3-26 19:46
A Game-Theoretic Approach to Content-Adaptive Steganographyolution exhibits a unique equilibrium in mixed strategies. Its location depends on the level of heterogeneity of the cover source, but never coincides with na?ve adaptive embedding. The model makes several simplifying assumptions, including independent cover symbols and the steganalyst’s ability to recover the adaptivity criterion perfectly.作者: Metamorphosis 時間: 2025-3-27 00:40
A New Measure of Watermarking Security Applied on QIMtion (DC-DM QIM) watermarking scheme where the dither vector plays the role of the secret key. This paper presents theoretical and practical computations of the effective key length. It shows that this scheme is not secure as soon as the adversary gets observations in the Known Message Attack context.作者: CRP743 時間: 2025-3-27 03:47
0302-9743 ceedings of the 14th Information Hiding Conference, IH 2012, held in Berkeley, CA, USA, in May 2012.The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on multimedia forensics and counter-forensics, stegana作者: 原諒 時間: 2025-3-27 06:49
Blind Median Filtering Detection Using Statistics in Difference Domainstatistics in the difference domain of images. Extensive simulations are carried out, which demonstrates that the proposed MF detection scheme is effective and reliable for both uncompressed and JPEG post-compressed images, even in the case of low resolution and strong JPEG compression.作者: INTER 時間: 2025-3-27 12:08 作者: Frisky 時間: 2025-3-27 17:01
Textural Features for Steganalysisted to form a new set of 22,153 features, which are used with the FLD-based ensemble classifier to steganalyze the HUGO on BOSSbase 0.92. At the embedding rate of 0.4 bpp (bit per pixel)? an average detection accuracy of 83.92% has been achieved. It is expected that this new approach can enhance our capability in steganalysis.作者: 無可非議 時間: 2025-3-27 20:45 作者: Rct393 時間: 2025-3-27 22:27 作者: Osteoporosis 時間: 2025-3-28 03:03 作者: antedate 時間: 2025-3-28 08:01
Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarki decrypted domain and the encrypted domain. This means neither the plain image nor its encrypted version is required for the extraction. The experiments demonstrate the validity and the advantages of our proposed method.作者: 頭腦冷靜 時間: 2025-3-28 14:15
Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data Experimental results show that the proposed watermarking scheme is robust against many possible attacks such as uniform affine transforms (scaling, rotation and translation), noise addition, reordering and cropping.作者: 阻塞 時間: 2025-3-28 18:39
Bias Equalizer for Binary Probabilistic Fingerprinting Codeszed for probabilistic fingerprinting codes utilizing the encoding parameters. Although the proposed bias equalizer is highly dependent on collusion strategies, it can improve the performance of traceability for some typical strategies to which the conventional bias equalizer can not be applied.作者: Ethics 時間: 2025-3-28 22:06
0302-9743 lysis, data hiding in unusual content, steganography, covert channels, anonymity and privacy, watermarking, and fingerprinting.978-3-642-36372-6978-3-642-36373-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 重畫只能放棄 時間: 2025-3-28 23:13 作者: frenzy 時間: 2025-3-29 06:09 作者: Flat-Feet 時間: 2025-3-29 10:34
Blind Median Filtering Detection Using Statistics in Difference Domainper, we focus on two topics: 1) an analysis of the statistics in the difference domain of median filtered images; 2) a new approach based on the statistical characterization in difference domain to overcome the shortages of the prior related works. Specifically, we derive the cumulative distribution作者: 對待 時間: 2025-3-29 13:50 作者: 教唆 時間: 2025-3-29 16:18 作者: narcissism 時間: 2025-3-29 20:45 作者: obstinate 時間: 2025-3-30 03:52
Textural Features for Steganalysisis. On the other hand, the data hidden in the image texture area has been known difficult to detect for years, and the modern steganographic schemes tend to embed data into complicated texture area where the statistical modeling becomes difficult. Based on these observations, we propose to learn and作者: decode 時間: 2025-3-30 05:12
JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifactsg the previous art, we work with the difference between the stego image and an estimate of the cover image obtained by recompression with a JPEG quantization table estimated from the stego image. To better distinguish recompression artifacts from embedding changes, the difference image is represente作者: 案發(fā)地點 時間: 2025-3-30 08:51 作者: 野蠻 時間: 2025-3-30 12:33
Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Datale anchor-points captured by the maxima in spatio-temporal curvature and filtered by posterior attack model. For each segment, we make a randomized cluster division of 3D points based on a secret key. A watermark is then embedded within these clusters by Triangle Orthocenter based encoding approach.作者: 多骨 時間: 2025-3-30 17:37 作者: Crepitus 時間: 2025-3-30 23:24
Key-Efficient Steganographyide from the sender and the intended receiver, can even detect the presence of the secret message. In this paper, we provide a new provably-secure, private-key steganographic encryption protocol secure in the framework of Hopper et al. [2]. We first present a ”one-time stegosystem” that allows two p作者: 眉毛 時間: 2025-3-31 04:24
Secret Agent Radio: Covert Communication through Dirty Constellationsreless communication protocols. We call our technique Dirty Constellation because we hide the covert messages within a “dirty” constellation that mimics noise commonly imposed by hardware imperfections and channel conditions. The cover traffic in this method is the baseband modulation constellation.作者: 詞根詞綴法 時間: 2025-3-31 08:36 作者: Water-Brash 時間: 2025-3-31 12:12
The Dangers of Composing Anonymous Channelsmultiple Crowds-like forward channels with a Hordes reply channel in an attempt to offer robustness in a mobile environment. We show that the resulting scheme fails to guarantee the claimed .-anonymity, and is in fact more vulnerable to malicious peers than Hordes, while suffering from higher latenc作者: 邪惡的你 時間: 2025-3-31 15:53 作者: 不可比擬 時間: 2025-3-31 20:30 作者: arousal 時間: 2025-4-1 01:28 作者: 熱心 時間: 2025-4-1 05:23