標(biāo)題: Titlebook: Digital Forensics and Watermarking; 19th International W Xianfeng Zhao,Yun-Qing Shi,Hyoung Joong Kim Conference proceedings 2021 Springer N [打印本頁(yè)] 作者: HBA1C 時(shí)間: 2025-3-21 18:14
書目名稱Digital Forensics and Watermarking影響因子(影響力)
書目名稱Digital Forensics and Watermarking影響因子(影響力)學(xué)科排名
書目名稱Digital Forensics and Watermarking網(wǎng)絡(luò)公開度
書目名稱Digital Forensics and Watermarking網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Digital Forensics and Watermarking被引頻次
書目名稱Digital Forensics and Watermarking被引頻次學(xué)科排名
書目名稱Digital Forensics and Watermarking年度引用
書目名稱Digital Forensics and Watermarking年度引用學(xué)科排名
書目名稱Digital Forensics and Watermarking讀者反饋
書目名稱Digital Forensics and Watermarking讀者反饋學(xué)科排名
作者: Fissure 時(shí)間: 2025-3-21 22:02 作者: Evacuate 時(shí)間: 2025-3-22 03:59
Human Well-Being Research and Policy Making frames into the animated GIF. While file size expansion is inevitable, reverse zero run length is adopted to suppress the expansion. The proposed method is reversible, i.e., the original image can be recovered.作者: 怕失去錢 時(shí)間: 2025-3-22 08:19
Oriana Bernasconi,Elizabeth Lira K.cation problem of a group of manipulation operations and a binary detection problem of JPEG compression with high quality factor, both on relatively small image patches. Experimental results show the utility of our method with a noticeable and consistent performance improvement after scaling.作者: Glucose 時(shí)間: 2025-3-22 11:58 作者: outer-ear 時(shí)間: 2025-3-22 14:33
Complete Quality Preserving Data Hiding in Animated GIF with Reversibility and Scalable Capacity Fun frames into the animated GIF. While file size expansion is inevitable, reverse zero run length is adopted to suppress the expansion. The proposed method is reversible, i.e., the original image can be recovered.作者: outer-ear 時(shí)間: 2025-3-22 20:54
Data-Dependent Scaling of CNN’s First Layer for Improved Image Manipulation Detectioncation problem of a group of manipulation operations and a binary detection problem of JPEG compression with high quality factor, both on relatively small image patches. Experimental results show the utility of our method with a noticeable and consistent performance improvement after scaling.作者: OREX 時(shí)間: 2025-3-22 21:34
https://doi.org/10.1007/978-3-031-56529-8ent platform. The approach comprises techniques for informed watermark embedding and non-blind watermark detection. Based on a proof-of-concept prototype, the approach is evaluated regarding configurability, robustness, and performance.作者: 騎師 時(shí)間: 2025-3-23 02:01 作者: Ballerina 時(shí)間: 2025-3-23 06:45
Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage Detectionent platform. The approach comprises techniques for informed watermark embedding and non-blind watermark detection. Based on a proof-of-concept prototype, the approach is evaluated regarding configurability, robustness, and performance.作者: incarcerate 時(shí)間: 2025-3-23 11:03 作者: 供過(guò)于求 時(shí)間: 2025-3-23 14:15
0302-9743 ch as: novel research, development and application of digital watermarking and forensics techniques for multimedia security..978-3-030-69448-7978-3-030-69449-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 文藝 時(shí)間: 2025-3-23 20:53
Maria Regina Celestino de Almeida itself to form the final distortion function. With the proposed distortion function, secret data can be embedded into the enhanced cover image with minimal image distortion using syndrome trellis coding (STC). As a result, less detectable artifacts left in the stego images, so that high undetectability is achieved.作者: 使混合 時(shí)間: 2025-3-24 01:12 作者: 教育學(xué) 時(shí)間: 2025-3-24 03:16
0302-9743 ne, VIC, Australia, in November 2020..The 20 full papers in this volume were carefully reviewed and selected from 43 submissions. They cover topics such as: novel research, development and application of digital watermarking and forensics techniques for multimedia security..978-3-030-69448-7978-3-03作者: Tortuous 時(shí)間: 2025-3-24 08:51
Digital Forensics and Watermarking978-3-030-69449-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: habitat 時(shí)間: 2025-3-24 11:24
https://doi.org/10.1007/978-3-030-69449-4artificial intelligence; computer networks; computer science; computer security; computer systems; comput作者: 描述 時(shí)間: 2025-3-24 18:25 作者: 字形刻痕 時(shí)間: 2025-3-24 22:04
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/279334.jpg作者: LIMIT 時(shí)間: 2025-3-25 02:28
https://doi.org/10.1007/978-3-031-63406-2xt. Since modification traces will inevitably be left on the carrier, it is hard to resist the detection of the steganalysis algorithms. To address this problem, this paper proposes a novel steganographic framework called multi-modal steganography, which hides secret messages at the semantic level. 作者: ULCER 時(shí)間: 2025-3-25 05:37 作者: nephritis 時(shí)間: 2025-3-25 08:58
Maria Regina Celestino de Almeidamages. The pixel prediction error and the cost of the pixel value itself are joint to fit the unique properties of enhanced image. Given a cover image, each pixel is predicted by its neighbors. The prediction error, which reflects the texture complexity, are combined with the cost of the pixel value作者: 木訥 時(shí)間: 2025-3-25 14:50
Benita Herreros Cleret de Langavantds are based on single modality of carriers and embed confidential information into the carriers by cover modification or cover synthesis. Since the distortions between the covers after embedding and the original covers are inevitable, these steganography methods can be detected by the existing steg作者: 弓箭 時(shí)間: 2025-3-25 19:48
Maria Regina Celestino de Almeidaystem (BIS), and has been applied to many fields successfully by exploit its characteristics of self-learning and self-organizing. In this paper, we open a new field for applications of AIS, namely, immune cover construction for steganography application. We proposed an AIS-based steganography frame作者: Ostrich 時(shí)間: 2025-3-25 21:25 作者: 笨重 時(shí)間: 2025-3-26 02:16
https://doi.org/10.1007/978-3-319-17807-3 may bring great challenges in the governance of cyberspace security. The previous linguistic steganalysis methods based on neural networks with word embedding layer could only extract the context-independent word-level features, which are insufficient for capturing the complex semantic dependencies作者: 史前 時(shí)間: 2025-3-26 05:31
Yabing Chen,Kaiyu Yuan,Jay McDonaldmunicated with each other is seldom protected. It can be dangerous because they often have very secret relationship. Noticeably, in recent two years some researchers respectively proposed robust and secure steganographic schemes which realize dependable steganography in the lossy channel of social m作者: 禁止 時(shí)間: 2025-3-26 10:29
https://doi.org/10.1007/978-3-031-56529-8uthorized users, trusting that the data will not be disclosed to third parties. Digital watermarking for data leakage detection aims to prevent the unauthorized disclosure of data by imperceptibly marking the data for each authorized user, so that the authorized user can be identified as the data le作者: 極小 時(shí)間: 2025-3-26 16:03 作者: Charlatan 時(shí)間: 2025-3-26 18:23 作者: Detain 時(shí)間: 2025-3-26 21:29
Viviana A. Rivarola,Ingrid Sol Cognoe conducted to partial image regions or splicing edges to promise visual consistency. Revealing the blurring inconsistency among the whole image regions contributes to the splicing detection. However, for the defocused image already containing blur inconsistency, the existing methods cannot work wel作者: Presbyopia 時(shí)間: 2025-3-27 02:11
https://doi.org/10.1007/978-3-319-12730-9public security, thus the identification of fake videos has become increasingly active in current researches. However, most present Deepfake detection methods concentrate on exposing facial defects through direct facial feature analysis while merely considering the synergies with authentic behavior 作者: Mortar 時(shí)間: 2025-3-27 09:14 作者: BARK 時(shí)間: 2025-3-27 09:47 作者: Vertical 時(shí)間: 2025-3-27 17:11 作者: Patrimony 時(shí)間: 2025-3-27 19:40 作者: 不真 時(shí)間: 2025-3-27 23:28 作者: Nmda-Receptor 時(shí)間: 2025-3-28 03:09
Variable Rate Syndrome-Trellis Codes for Steganography on Bursty Channelsg rates. In the embedding, a cover vector is sliced into segments, and the embedding rates for each segment depend on the local channel distribution. The parities of stego segments are exploited to indicate the selected embedding rates according to a mapping function between parities and embedding r作者: 無(wú)價(jià)值 時(shí)間: 2025-3-28 09:48
Steganographic Distortion Function for Enhanced Imagesmages. The pixel prediction error and the cost of the pixel value itself are joint to fit the unique properties of enhanced image. Given a cover image, each pixel is predicted by its neighbors. The prediction error, which reflects the texture complexity, are combined with the cost of the pixel value作者: 可忽略 時(shí)間: 2025-3-28 14:01 作者: geometrician 時(shí)間: 2025-3-28 18:21 作者: vasculitis 時(shí)間: 2025-3-28 20:40
Generating JPEG Steganographic Adversarial Example via Segmented Adversarial Embeddingure based schemes. Besides steganalysis, CNN model can also be used in steganography. Inheriting the mechanism from adversarial attack to CNN model, adversarial embedding is a kind of steganographic scheme that exploits the knowledge of CNN-based steganalyzer. Adversarial embedding can effectively i作者: 顯赫的人 時(shí)間: 2025-3-28 23:32
High-Performance Linguistic Steganalysis, Capacity Estimation and Steganographic Positioning may bring great challenges in the governance of cyberspace security. The previous linguistic steganalysis methods based on neural networks with word embedding layer could only extract the context-independent word-level features, which are insufficient for capturing the complex semantic dependencies作者: 無(wú)所不知 時(shí)間: 2025-3-29 06:45 作者: 占卜者 時(shí)間: 2025-3-29 07:59
Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage Detectionuthorized users, trusting that the data will not be disclosed to third parties. Digital watermarking for data leakage detection aims to prevent the unauthorized disclosure of data by imperceptibly marking the data for each authorized user, so that the authorized user can be identified as the data le作者: 捏造 時(shí)間: 2025-3-29 14:25
Complete Quality Preserving Data Hiding in Animated GIF with Reversibility and Scalable Capacity Funata to be embedded. The newly crafted frame is inserted between 2 existing frames, and the delay time of the affected frames are adjusted accordingly to achieve complete imperceptibility. To the best of our knowledge, this is the first attempt to hide data into an animated GIF by exploiting the tran作者: 保存 時(shí)間: 2025-3-29 18:55
Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision utilized for visibly labeling the copyright of digital host. To protect the copyright of 3D mesh model, a visible reversible watermarking based on mesh subdivision is proposed in this paper. First, the smooth area of the 3D mesh model is projected onto the 2D plane for cropping and subdivision to a作者: 甜瓜 時(shí)間: 2025-3-29 22:46
Defocused Image Splicing Localization by?Distinguishing Multiple Cues between Raw Naturally Blur ande conducted to partial image regions or splicing edges to promise visual consistency. Revealing the blurring inconsistency among the whole image regions contributes to the splicing detection. However, for the defocused image already containing blur inconsistency, the existing methods cannot work wel作者: 痛苦一生 時(shí)間: 2025-3-30 01:21 作者: 釘牢 時(shí)間: 2025-3-30 05:01 作者: 沒(méi)血色 時(shí)間: 2025-3-30 08:51 作者: Commemorate 時(shí)間: 2025-3-30 12:38 作者: 思想上升 時(shí)間: 2025-3-30 18:49 作者: Hemiparesis 時(shí)間: 2025-3-30 22:00
Variable Rate Syndrome-Trellis Codes for Steganography on Bursty Channels of the cover vector. It can further improve the undetectability of the VR-STC. Experimental results on artificial signals and binary images suggest that the proposed VR-STC can provide high success rate of embedding and reduce the embedding cost on bursty channels.作者: 不公開 時(shí)間: 2025-3-31 04:42
Improving Text-Image Matching with Adversarial Learning and Circle Loss?for Multi-modal Steganograph matching algorithm with adversarial learning and circle loss. By selecting and transmitting the original multi-modal carriers with high relevancy, the proposed method can escape from the detection of current steganalysis methods. It is also illustrated by the theoretical analysis and experimental r作者: 藝術(shù) 時(shí)間: 2025-3-31 06:06