標(biāo)題: Titlebook: Information Hiding; 11th International W Stefan Katzenbeisser,Ahmad-Reza Sadeghi Conference proceedings 2009 Springer-Verlag Berlin Heidelb [打印本頁(yè)] 作者: hearken 時(shí)間: 2025-3-21 16:59
書目名稱Information Hiding影響因子(影響力)
書目名稱Information Hiding影響因子(影響力)學(xué)科排名
書目名稱Information Hiding網(wǎng)絡(luò)公開度
書目名稱Information Hiding網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Hiding被引頻次
書目名稱Information Hiding被引頻次學(xué)科排名
書目名稱Information Hiding年度引用
書目名稱Information Hiding年度引用學(xué)科排名
書目名稱Information Hiding讀者反饋
書目名稱Information Hiding讀者反饋學(xué)科排名
作者: 報(bào)復(fù) 時(shí)間: 2025-3-21 21:05 作者: 基因組 時(shí)間: 2025-3-22 01:00
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465068.jpg作者: 微生物 時(shí)間: 2025-3-22 07:52
978-3-642-04430-4Springer-Verlag Berlin Heidelberg 2009作者: IVORY 時(shí)間: 2025-3-22 10:13 作者: conscribe 時(shí)間: 2025-3-22 14:05
https://doi.org/10.1007/978-3-642-04431-13D watermarking; Code; DRM; Information; audio watermarking; authentication; classification; cryptography; d作者: Guaff豪情痛飲 時(shí)間: 2025-3-22 17:29
Fast BCH Syndrome Coding for Steganographyws us to hide data with small embedding capacity. Note that small capacities are highly recommended for steganography to survive steganalysis. The proposed scheme shows that BCH syndrome coding for data hiding is now practical ascribed to the reduced complexity.作者: Outshine 時(shí)間: 2025-3-22 21:18 作者: 綁架 時(shí)間: 2025-3-23 05:14
SVD-Based Ghost Circuitry Detectiong fast and non-destructive measurements of leakage power and/or delay. This is then combined with statistical constraint manipulation techniques to detect embedded ghost circuitry. The effectiveness of the approach is demonstrated on the ISCAS 85 benchmarks.作者: sinoatrial-node 時(shí)間: 2025-3-23 08:50
Feature-Based Camera Model Identification Works in Practice: feature-based camera model identification works in practice and provides reliable results even if only one device for each camera model under investigation is available to the forensic investigator.作者: 受辱 時(shí)間: 2025-3-23 13:31
Kwangtaek Kim,Mauro Barni,Hong Z. Tan use textual data analysis and text-based sensorimetrics. Chapters cover topics including corpus processing, frequencing data, and clustering methods. Case studies illustrate each chapter with accompanying data978-3-319-87823-2978-3-319-64572-8Series ISSN 2199-0956 Series E-ISSN 2199-0964 作者: Tracheotomy 時(shí)間: 2025-3-23 15:39 作者: Liberate 時(shí)間: 2025-3-23 18:13 作者: BACLE 時(shí)間: 2025-3-24 01:42
Teddy Furon,Luis Pérez-Freire,Arnaud Guyader,Frédéric Cérou作者: 外貌 時(shí)間: 2025-3-24 06:23 作者: 蝕刻術(shù) 時(shí)間: 2025-3-24 10:13 作者: 得罪人 時(shí)間: 2025-3-24 11:04 作者: 柔美流暢 時(shí)間: 2025-3-24 15:40
Tomá? Filler,Jessica Fridrichmotivated by the pragmatic goal of negatively evaluating New Labour’s use of the media as manipulation rather than as communication. As the stakes surrounding effective communication have raised, it seems that the importance of metaphor in political discourse is likely to increase rather than decrea作者: 時(shí)間等 時(shí)間: 2025-3-24 22:49
Rongyue Zhang,Vasiliy Sachnev,Hyoung Joong Kimfaith. Nesaf, rydym yn ystyried i ba raddau y mae’r prosiect wedi nodi anghenion penodol cymunedau o grwpiau defnyddwyr ac wedi ymdrin a nhw. I wneud hyn, mae angen ystyried sut buom yn ymgysylltu a grwpiau o ddefnyddwyr posibl y corpws drwy gydol y prosiect ac yn cyfathrebu a nhw. Yn olaf, rydym yn作者: Debility 時(shí)間: 2025-3-25 01:07 作者: Misnomer 時(shí)間: 2025-3-25 07:08 作者: Limerick 時(shí)間: 2025-3-25 10:45 作者: rheumatism 時(shí)間: 2025-3-25 12:42 作者: 過份艷麗 時(shí)間: 2025-3-25 18:46 作者: Spirometry 時(shí)間: 2025-3-25 23:06
Thomas Gloe,Karsten Borowka,Antje Winklerontent and design as well as at the level of corpus exploitation by learners and teachers’ (Braun, 2005: 55). Some empirical studies have been conducted to implement the idea of corpus pedagogic processing. An early example is Braun’s (2005) multimedia learning platform of ELISA, which consists of a作者: 排名真古怪 時(shí)間: 2025-3-26 03:10
Estimating Steganographic Fisher Information in Real Imagesized and -shaped pixel groups, and the results of DC normalization within pixel groups. This work suggests lessons for the future design of spatial-domain steganalysis, and also the optimization of embedding functions.作者: 安撫 時(shí)間: 2025-3-26 04:23
Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterizationethod outperforms conventional self-recovery fragile watermarking algorithms in tamper detection and tamper recovery under various attacks. Additionally, the proposed scheme is not vulnerable to the collage attack, constant-average attack and four-scanning attack.作者: fidelity 時(shí)間: 2025-3-26 09:54
Microphone Classification Using Fourier Coefficientsn, show a high accuracy of up to 93.5% correct classifications for the case of 2048 frequency coefficients in a test set of seven microphones classified with linear logistic regression models. This positive tendency motivates further experiments with larger test sets and further studies for microphone identification.作者: ANTH 時(shí)間: 2025-3-26 15:56
Fisher Information Determines Capacity of ,-Secure Steganographyems and optimizing their performance. In particular, using an analytic cover model fit to experimental data obtained from a large number of natural images, we prove that the ±1 embedding operation is asymptotically optimal among all mutually independent embedding operations that modify cover elements by at most 1.作者: TAG 時(shí)間: 2025-3-26 17:48
Forensic Tracking Watermarking against In-theater Piracysuspected position of the camcorder in the theater and to extract the embedded forensic marking data which specifies theater information and time stamp. Therefore, our watermarking system provides conclusive evidence to take the pirate to the court. Experimental results demonstrate robustness of the LACF and accuracy of the proposed modeling.作者: 血友病 時(shí)間: 2025-3-26 23:40
An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positiveemonstrate how to mix those two codes to inherit both of their advantages. The resulting 2-secure codes have short lengths, and possess the above characteristics whenever the number of pirates (may exceed two but) is not too large.作者: elucidate 時(shí)間: 2025-3-27 04:59
Embedding Ratio Estimating for Each Bit Plane of Images significance. A series of experiments show that the presented steganalysis method has significantly smaller bias than applying SPA method, a typical steganalysis for LSB steganography, to estimate the embedding ratio in each bit plane directly.作者: CT-angiography 時(shí)間: 2025-3-27 09:11
A Phase Modulation Audio Watermarking Techniquehich among other features provides evidence for high audio quality. The system combines the alteration of the phase with the spread spectrum concept and is referred to as Adaptive Spread Phase Modulation (ASPM). Extensive benchmarking provide the evidence for the inaudibility of the embedded watermark and the good robustness.作者: 真 時(shí)間: 2025-3-27 11:58 作者: aesthetician 時(shí)間: 2025-3-27 17:28
Estimating the Minimal Length of Tardos Codey that an innocent user is framed, and the probabilities that all colluders are missed. Therefore, for a given collusion size, we are able to estimate the minimal length of the code satisfying some error probabilities constraints. This estimation is far lower than the known lower bounds.作者: orient 時(shí)間: 2025-3-27 19:47
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions, parallelism, and provably correct partial simulation enables 10. advantage of communicating parties over an attacker, requiring over 500 of years of computation even if the attacker uses all global computation resources.作者: Dysarthria 時(shí)間: 2025-3-28 01:04
Detect Digital Image Splicing with Visual Cuesarpness as visual cues. We exploit this idea to develope a digital image splicing detection system with high performance. We present experimental results which show that the proposed system outperforms the prior arts. An additional advantage offered by the proposed system is that it provides a convenient way of localizing the splicing boundaries.作者: 觀點(diǎn) 時(shí)間: 2025-3-28 04:31
An Epistemological Approach to Steganographyplifying the problem substantially. An introduction to the epistemological perspective on steganography is given along with a structured discussion on how the novel perspective fits into the existing body of literature.作者: left-ventricle 時(shí)間: 2025-3-28 07:48 作者: 確認(rèn) 時(shí)間: 2025-3-28 13:51
0302-9743 organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.978-3-642-04430-4978-3-642-04431-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: faucet 時(shí)間: 2025-3-28 16:29 作者: 完成才會(huì)征服 時(shí)間: 2025-3-28 19:21
0302-9743 eld in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensi作者: 憤慨一下 時(shí)間: 2025-3-29 02:02
Supraliminal Audio Steganography: Audio Files Tricking Audiophilesarden. Such channels frequently have a very low embedding rate and therefore are unsuitable for more than simply exchanging steganographic public keys. This paper introduces a proof-of-concept supraliminal channel that uses WAV files to provide a high-bitrate method of embedding information in commo作者: prolate 時(shí)間: 2025-3-29 04:11
An Epistemological Approach to Steganographylogy to the list and argues that Simmon’s seminal prisoner’s problem has an empirical dimension, which cannot be ignored (or defined away) without simplifying the problem substantially. An introduction to the epistemological perspective on steganography is given along with a structured discussion on作者: Temporal-Lobe 時(shí)間: 2025-3-29 07:50 作者: 真實(shí)的人 時(shí)間: 2025-3-29 14:04 作者: V洗浴 時(shí)間: 2025-3-29 15:52 作者: 鍍金 時(shí)間: 2025-3-29 22:00
Estimating Steganographic Fisher Information in Real Imagesriments to approximate the distributions of genuine covers. The complete distribution cannot be estimated, but with carefully-chosen algorithms and a large corpus we can make local approximations by considering groups of pixels. A simple estimator for the local quadratic term of Kullback-Leibler div作者: Ornithologist 時(shí)間: 2025-3-30 00:13
Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2d episode, the previously existing daily limit of 30 oracle calls per IP address was lifted to allow for sensitivity analysis. Often disrespected because of their extensive oracle use, sensitivity attacks can reveal up to one bit of information about the watermark in each experiment. In this paper w作者: 系列 時(shí)間: 2025-3-30 07:14 作者: Bumble 時(shí)間: 2025-3-30 11:26 作者: 紡織品 時(shí)間: 2025-3-30 16:19 作者: 催眠 時(shí)間: 2025-3-30 17:47 作者: 緯度 時(shí)間: 2025-3-31 00:00 作者: FOLLY 時(shí)間: 2025-3-31 04:55 作者: 大范圍流行 時(shí)間: 2025-3-31 06:20
Roughness-Adaptive 3D Watermarking of Polygonal Mesheshe best of our knowledge, has not been studied in 3D digital watermarking. Our idea is to adapt watermark strength to local surface roughness based on the knowledge that human eyes are less sensitive to changes on a rougher surface patch than those on a smoother surface. We implemented our idea in a作者: 花爭(zhēng)吵 時(shí)間: 2025-3-31 11:05 作者: 圣人 時(shí)間: 2025-3-31 14:39
SVD-Based Ghost Circuitry Detectionhange circuit functionality. There are numerous GC insertion sources, including untrusted foundries, synthesis tools and libraries, testing and verification tools, and configuration scripts. Moreover, GC attacks can greatly compromise the security and privacy of hardware users, either directly or th作者: Intentional 時(shí)間: 2025-3-31 19:01
Microphone Classification Using Fourier Coefficientsl used to record a given audio sample. Our approach is to extract a Fourier coefficient histogram of near-silence segments of the recording as the feature vector and to use machine learning techniques for the classification. Our test goals are to determine whether attempting microphone forensics is 作者: arcane 時(shí)間: 2025-4-1 00:15
Detect Digital Image Splicing with Visual Cuesomatic detection framework to identify a spliced image. Distinguishing from existing methods, the proposed system is based on a human visual system (HVS) model in which visual saliency and fixation are used to guide the feature extraction mechanism. An interesting and important insight of this work 作者: 小畫像 時(shí)間: 2025-4-1 01:50
Feature-Based Camera Model Identification Works in Practice to discover the probable source model employed to acquire an image under investigation. However, little is known about the performance on large sets of cameras that include multiple devices of the same model. Following the process of a forensic investigation, this paper tackles important questions 作者: 侵略者 時(shí)間: 2025-4-1 06:38 作者: anagen 時(shí)間: 2025-4-1 13:15
Heather Crawford,John Aycocko ‘smoking gun’ that linked his country to the al-Qa’ida network that perpetrated the 11 September attacks on the USA. However, the American president, George W. Bush, accused Iraq of being ‘a(chǎn)t the epicentre of terrorism’ and warned terrorists that ‘there’s no cave deep enough for the long arm of Am作者: overreach 時(shí)間: 2025-4-1 15:34 作者: AGOG 時(shí)間: 2025-4-1 21:38 作者: BIAS 時(shí)間: 2025-4-2 02:23
Rongyue Zhang,Vasiliy Sachnev,Hyoung Joong Kimal a phosibl y ffyrdd y mae’r Gymraeg yn cael ei defnyddio a’i chanfod ar hyn o bryd. Yn ail, dylai seilwaith y corpws ymdrin ag anghenion y grwpiau amrywiol o ddefnyddwyr cymunedol sy’n gweithredu yn Gymraeg neu sy’n ymgysylltu a’r Gymraeg. Yn y bennod hon, rydym yn gwerthuso i ba raddau y cynrychi