派博傳思國際中心

標(biāo)題: Titlebook: Digital Forensics and Watermarking; 15th International W Yun Qing Shi,Hyoung Joong Kim,Feng Liu Conference proceedings 2017 Springer Intern [打印本頁]

作者: Hayes    時間: 2025-3-21 18:48
書目名稱Digital Forensics and Watermarking影響因子(影響力)




書目名稱Digital Forensics and Watermarking影響因子(影響力)學(xué)科排名




書目名稱Digital Forensics and Watermarking網(wǎng)絡(luò)公開度




書目名稱Digital Forensics and Watermarking網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Digital Forensics and Watermarking被引頻次




書目名稱Digital Forensics and Watermarking被引頻次學(xué)科排名




書目名稱Digital Forensics and Watermarking年度引用




書目名稱Digital Forensics and Watermarking年度引用學(xué)科排名




書目名稱Digital Forensics and Watermarking讀者反饋




書目名稱Digital Forensics and Watermarking讀者反饋學(xué)科排名





作者: 驚呼    時間: 2025-3-21 21:25
https://doi.org/10.1007/978-1-4614-8193-5gnal. ODG and SDG analysis are performed on both the original and watermarked signal and the results signify the efficiency of the proposed scheme. Moreover, some signal processing operations are finally carried out on the watermarked signal and the outcome was intriguing as all attacks are countera
作者: Pantry    時間: 2025-3-22 02:38

作者: 下邊深陷    時間: 2025-3-22 04:58
Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authenticationgnal. ODG and SDG analysis are performed on both the original and watermarked signal and the results signify the efficiency of the proposed scheme. Moreover, some signal processing operations are finally carried out on the watermarked signal and the outcome was intriguing as all attacks are countera
作者: 挫敗    時間: 2025-3-22 09:03

作者: 暗指    時間: 2025-3-22 14:08

作者: 暗指    時間: 2025-3-22 20:33

作者: defuse    時間: 2025-3-22 23:01
Jewellord Nem Singh,France Bourgouin and time-saving countermeasure against video-based face spoofing attacks based on LBP (Local Binary Patterns) and multiscale DCT (Discrete Cosine Transform) is proposed. Adopted as the low-level descriptors, LBP features are used to extract spatial information in each selected frame. Next, multisca
作者: 1分開    時間: 2025-3-23 02:12

作者: 豐滿中國    時間: 2025-3-23 06:37

作者: nonsensical    時間: 2025-3-23 11:09
Sleep Mode for Power Saving Class Type IItion Residual Distribution (PRED) analysis is proposed in the paper. The proposed scheme can be applied to detect double H.264 compression with non-aligned GOP structures. For each frame of a given video, the prediction residual is first calculated and the average value of the prediction residual in
作者: 有害    時間: 2025-3-23 15:08

作者: 遠(yuǎn)足    時間: 2025-3-23 19:33

作者: Ornament    時間: 2025-3-23 23:26
Fault Tolerance in MapReduce: A Surveyits content and eventually introduce side effect to the identification accuracy. In this paper, an effective source camera identification scheme based on guided image estimation and block weighted average is proposed. Before the SPN extraction, an adaptive SPN estimator based on image content is imp
作者: 粉筆    時間: 2025-3-24 05:01

作者: 漫步    時間: 2025-3-24 08:39
https://doi.org/10.1007/978-1-4614-8193-5However, it might be impossible to recover if lost, counterfeited or hacked, thereby ruining the general aim of securing it. In this paper, an 8-layered feature enhancement algorithm is proposed. A centroid based semi-fragile audio watermarking is used to conceal the enhanced fingerprint biometric d
作者: 枕墊    時間: 2025-3-24 13:11

作者: Mystic    時間: 2025-3-24 16:08
Pedro Vale Pinheiro,Fernando Boavidaontrast Limited Adaptive Histogram Equalization is proposed as a preprocessing stage in images. SURF is used to extract keypoints from the preprocessed image. Even in flat regions, the method can also extract enough keypoints. In the matching stage, g2NN matching skill is used which can also detect
作者: Astigmatism    時間: 2025-3-24 22:28
https://doi.org/10.1007/978-3-319-06704-9content. In this paper, we present a local derivative pattern (LDP) based forensic framework to detect if a digital image has been processed by seam carving or not. Each image is firstly encoded by applying four LDP encoders. Afterward, 96-D features are extracted from the encoded LDP images, and th
作者: CT-angiography    時間: 2025-3-25 01:18

作者: Enthralling    時間: 2025-3-25 05:44
P. Savithri,R. Perumal,R. Nagarajanerminals should not be ignored as well. In this paper, we investigate the color mixture model of a well-known psychophysical phenomenon: “persistence of vision”, and propose a new display technology which presents secret and cheating information at the same time. Unauthorized viewers only see the ch
作者: 變白    時間: 2025-3-25 10:36
V. Balasubramanian,J. K. Ladha,G. L. Denning design. However, most of the previous RG-based threshold VSS still suffer from low visual quality or worse reconstructed secrets when more shares are stacked. In this paper, a new RG-based VSS with improved visual quality is proposed. The random bits are utilized to improve the visual quality as we
作者: Colonnade    時間: 2025-3-25 12:59
Resource Management and Transport Layer information. In this paper, we propose a (.,?.)-HVCS using complementary cover images. Before the halftone processing of the cover images by error diffusion, secret information pixels (SIPs) are prefixed based on the underlying (.,?.)-VCS. In the halftone processing, several pairs of complementary
作者: RENIN    時間: 2025-3-25 17:49

作者: 潰爛    時間: 2025-3-25 23:45

作者: 指數(shù)    時間: 2025-3-26 00:43
978-3-319-53464-0Springer International Publishing AG 2017
作者: 消散    時間: 2025-3-26 07:50
Digital Forensics and Watermarking978-3-319-53465-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 倔強(qiáng)一點    時間: 2025-3-26 08:59
Using Benford’s Law Divergence and Neural Networks for Classification and Source Identification of B Benford’s law are used as input features for a Neural Network for the classification and source identification of biometric images. Experimental analysis shows that the classification and identification of the source of the biometric images can achieve good accuracies between the range of 90.02% and 100%.
作者: STELL    時間: 2025-3-26 13:37

作者: Cabg318    時間: 2025-3-26 19:35
Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality stacked. In this paper, a new RG-based VSS with improved visual quality is proposed. The random bits are utilized to improve the visual quality as well as to decrease the darkness of the reconstructed secret image in the proposed scheme. Experimental results and analyses show the effectiveness of the proposed scheme.
作者: 小隔間    時間: 2025-3-26 22:16

作者: GEM    時間: 2025-3-27 04:50
Suejb Memeti,Sabri Pllana,Joanna Ko?odziejNetworks structure and Laplacian filter is used in the signal enhancement layer. We test the proposed method on four kinds of small-size image databases. The experimental results have demonstrate that the proposed algorithm is effective. The detection accuracies for different image size database are all above?95%.
作者: single    時間: 2025-3-27 07:44
P. Savithri,R. Perumal,R. Nagarajanstance between the two liquid crystal layers, the size of the visible space can be controlled in such a way that larger distance will result in a smaller visible space, while smaller distance will result in a larger visible space.
作者: 一窩小鳥    時間: 2025-3-27 12:03

作者: 朝圣者    時間: 2025-3-27 15:01
Resource Management and Transport Layercover images are adopted and two halftone methods on the cover images are designed for different (.,?.) threshold access structures. The proposed scheme removes the share’s cross interference from other shares and obtains better visual quality. Furthermore, the proposed scheme eliminates the burden that each participant may carry multiple shares.
作者: 永久    時間: 2025-3-27 19:36

作者: EXCEL    時間: 2025-3-28 00:38

作者: Injunction    時間: 2025-3-28 04:20

作者: 剝削    時間: 2025-3-28 08:23

作者: 把…比做    時間: 2025-3-28 13:22

作者: 摘要    時間: 2025-3-28 15:40

作者: 小歌劇    時間: 2025-3-28 21:53

作者: 人類的發(fā)源    時間: 2025-3-29 02:03
International Political Economy SeriesN-SDF, respectively. To the best of our knowledge, it is the first attempt to comprehensively define the self-noise of cell-phone and furthermore apply it to source identification issue of audio forensics.
作者: 遭受    時間: 2025-3-29 07:07
Sleep Mode for Power Saving Class Type Icted as acoustic features, and then Support vector machine (SVM) classifiers are used to separate disguised voices from original voices. Experimental results verify the excellent performance of the proposed scheme in the noisy environment.
作者: PLIC    時間: 2025-3-29 07:38

作者: GULF    時間: 2025-3-29 14:10
Ruonan Zhang,Lin Cai,Jianping Panoach can effectively solve the inaccurate locating problem caused by outliers. It also performs better than reference algorithm in locating spliced regions, especially for those with realistic appearances, and improves the robustness effectively.
作者: visceral-fat    時間: 2025-3-29 16:21

作者: barium-study    時間: 2025-3-29 23:26

作者: 不能強(qiáng)迫我    時間: 2025-3-30 01:59

作者: 空中    時間: 2025-3-30 06:48

作者: sebaceous-gland    時間: 2025-3-30 09:37
A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimationoach can effectively solve the inaccurate locating problem caused by outliers. It also performs better than reference algorithm in locating spliced regions, especially for those with realistic appearances, and improves the robustness effectively.
作者: 我吃花盤旋    時間: 2025-3-30 13:17

作者: 臭了生氣    時間: 2025-3-30 19:28

作者: osteocytes    時間: 2025-3-31 00:30
Pedro Vale Pinheiro,Fernando Boavidad image. Even in flat regions, the method can also extract enough keypoints. In the matching stage, g2NN matching skill is used which can also detect multiple forgeries. The experimental results show that the proposed method performs better than the state-of-the-art algorithms on the public database.
作者: 整理    時間: 2025-3-31 04:52
V. Balasubramanian,J. K. Ladha,G. L. Denning stacked. In this paper, a new RG-based VSS with improved visual quality is proposed. The random bits are utilized to improve the visual quality as well as to decrease the darkness of the reconstructed secret image in the proposed scheme. Experimental results and analyses show the effectiveness of the proposed scheme.
作者: 機(jī)構(gòu)    時間: 2025-3-31 07:06
Recapture Image Forensics Based on Laplacian Convolutional Neural NetworksNetworks structure and Laplacian filter is used in the signal enhancement layer. We test the proposed method on four kinds of small-size image databases. The experimental results have demonstrate that the proposed algorithm is effective. The detection accuracies for different image size database are all above?95%.
作者: SHOCK    時間: 2025-3-31 11:51
Privacy Monitorstance between the two liquid crystal layers, the size of the visible space can be controlled in such a way that larger distance will result in a smaller visible space, while smaller distance will result in a larger visible space.
作者: SUE    時間: 2025-3-31 16:25

作者: Jargon    時間: 2025-3-31 21:16

作者: Hiatus    時間: 2025-4-1 00:07

作者: MAZE    時間: 2025-4-1 05:23
A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networksl the traces that forensics based on, some farsighted forgers take advantage of so-called anti-forensics to make their forgery more convincing. To rebuild the credibility of forensics, many countermeasures against anti-forensics have been proposed. This paper presents a multi-purpose approach to det




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
永修县| 常熟市| 遵义市| 三亚市| 和平区| 通海县| 邻水| 抚顺县| 辉县市| 南漳县| 韩城市| 枣强县| 响水县| 嘉荫县| 娄烦县| 伊宁县| 色达县| 砀山县| 突泉县| 浏阳市| 门头沟区| 晴隆县| 万荣县| 化德县| 新津县| 于田县| 沙湾县| 宜兴市| 遂平县| 平塘县| 拉萨市| 庆安县| 措美县| 双流县| 梁山县| 温州市| 博兴县| 浦东新区| 泰州市| 双辽市| 堆龙德庆县|