派博傳思國際中心

標(biāo)題: Titlebook: Digital Watermarking; 9th International Wo Hyoung-Joong Kim,Yun Qing Shi,Mauro Barni Conference proceedings 2011 Springer Berlin Heidelberg [打印本頁]

作者: calcification    時(shí)間: 2025-3-21 18:49
書目名稱Digital Watermarking影響因子(影響力)




書目名稱Digital Watermarking影響因子(影響力)學(xué)科排名




書目名稱Digital Watermarking網(wǎng)絡(luò)公開度




書目名稱Digital Watermarking網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Digital Watermarking被引頻次




書目名稱Digital Watermarking被引頻次學(xué)科排名




書目名稱Digital Watermarking年度引用




書目名稱Digital Watermarking年度引用學(xué)科排名




書目名稱Digital Watermarking讀者反饋




書目名稱Digital Watermarking讀者反饋學(xué)科排名





作者: pericardium    時(shí)間: 2025-3-21 23:56

作者: FLAGR    時(shí)間: 2025-3-22 00:56

作者: 保留    時(shí)間: 2025-3-22 05:15

作者: antenna    時(shí)間: 2025-3-22 08:55
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit, Ye, Pattern Recognition Lett. 31(2010) 347-354]. Through the scrambling algorithm, the pixel locations and values can be encrypted at the same time. This scheme can be thought of as a typical binary image scrambling encryption considering the bit-plain of size .×8.. In [Li C.Q., Lo K. T., http://ar
作者: 溺愛    時(shí)間: 2025-3-22 14:13

作者: 溺愛    時(shí)間: 2025-3-22 18:59
A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Applicationcal analysis of quantization, with a Generalized Gaussian model being considered as the PDF for non-quantized block DCT coefficients. We subsequently propose a novel method to detect potential JPEG compression history in bitmap images using the PMF that has been developed. We show that this method o
作者: Costume    時(shí)間: 2025-3-23 00:06
A Smart Phone Image Database for Single Image Recapture Detection,ased counter-measure for rebroadcast attack on a face authentication system becomes feasible. Being able to detect recaptured images, general object recognition can differentiate the objects on a poster from the real ones, so that robot vision is more intelligent. Being able to detect recaptured ima
作者: 開花期女    時(shí)間: 2025-3-23 02:20
Detection of Tampering Inconsistencies on Mobile Photos,by mobile devices. As tampering often creates some inconsistencies, we propose in this paper a novel framework to statistically detect the image tampering inconsistency using accurately detected demosaicing weights features. By first cropping four non-overlapping blocks, each from one of the four qu
作者: 相信    時(shí)間: 2025-3-23 06:20
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise,image forensics. We propose an algorithm which can locate tampered region(s) in a lossless compressed tampered image when its unchanged region is output of JPEG decompressor. We find the tampered region and the unchanged region have different responses for JPEG compression. The tampered region has s
作者: 障礙物    時(shí)間: 2025-3-23 11:21

作者: 不安    時(shí)間: 2025-3-23 17:41

作者: 相互影響    時(shí)間: 2025-3-23 18:49

作者: DAFT    時(shí)間: 2025-3-23 23:50

作者: COW    時(shí)間: 2025-3-24 05:19

作者: 能夠支付    時(shí)間: 2025-3-24 08:03

作者: 阻礙    時(shí)間: 2025-3-24 12:17
Ternary Data Hiding Technique for JPEG Steganography, coefficient is converted to the corresponding ternary coefficient. The block of 3.???1 ternary coefficients is used for hiding . ternary messages by modifying one or two coefficients. Due to higher information density of the ternary coefficients, the proposed method has many solutions for hiding ne
作者: 新義    時(shí)間: 2025-3-24 18:11
Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting, embedding (PSE) scheme has provided better interleaving collusion resistance than conventional scheme, our study shows that the resistance is still weaker than that under averaging collusion at moderate-to-high watermark-to-noise ratio (WNR). We then propose interleaving embedding (ILE) scheme to e
作者: 做事過頭    時(shí)間: 2025-3-24 19:39
A Novel Collusion Attack Strategy for Digital Fingerprinting,for unintended purpose. A cost-efficient attack against digital fingerprinting, known as collusion attack, involves a group of users who combine their fingerprinted content for the purpose of attenuating or removing the fingerprints. In this paper, we analyze and simulate the effect of Gaussian nois
作者: 與野獸博斗者    時(shí)間: 2025-3-25 00:47

作者: implore    時(shí)間: 2025-3-25 07:18
Robust Blind Watermarking Scheme Using Wave Atoms,m against nine types of attacks like JPEG compression, Gaussian Noise addition, Median Filtering, Salt and Pepper noise, etc. They are carried out using Matlab Software. The experimental results demonstrate that the proposed algorithms have great robustness against various imaging attacks.
作者: 詢問    時(shí)間: 2025-3-25 11:30

作者: 不可接觸    時(shí)間: 2025-3-25 12:15

作者: intrigue    時(shí)間: 2025-3-25 16:48
Kontext: Die Ausgangsbasis der Untersuchunge alignment points is increased by performing a simple plane transform on one of the shares. This results in the same secret being recovered when the shares correctly aligned. The technique has also been extended to encompass multiple secrets, each of which can be recovered depending on the type of transformation performed on the shares.
作者: GROUP    時(shí)間: 2025-3-25 23:23

作者: boisterous    時(shí)間: 2025-3-26 02:38
Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model,blem in image classification, too. In this paper, we propose using HMT(hidden Markov tree) to classifying natural images and computer graphics images. A set of features are derived from HMT model parameters and its effect is verified by experiment. The average accuracy is up to 84.6%.
作者: 蘑菇    時(shí)間: 2025-3-26 08:04
Plane Transform Visual Cryptography,e alignment points is increased by performing a simple plane transform on one of the shares. This results in the same secret being recovered when the shares correctly aligned. The technique has also been extended to encompass multiple secrets, each of which can be recovered depending on the type of transformation performed on the shares.
作者: STYX    時(shí)間: 2025-3-26 12:30
An Efficient Pattern Substitution Watermarking Method for Binary Images,derably for un-overlapping version of the PS method. Experiment results show that our method works well on decreasing the size of location map. Comparison results with the original PS method demonstrate that the proposed method achieves more embedding capacity and higher PSNR value due to the reduced size of the location map.
作者: 是限制    時(shí)間: 2025-3-26 15:26
https://doi.org/10.1007/978-3-658-18001-0sed by arithmetic coding as a part of overhead information. Comparing with the existing spatial domain reversible watermark methods, the proposed method can achieve much better PSNR value at the high embedding rate. Experimental results prove the effectiveness of the proposed watermarking scheme.
作者: mastopexy    時(shí)間: 2025-3-26 19:08

作者: 伴隨而來    時(shí)間: 2025-3-26 23:56
Reversible Watermarking Using Prediction Error Histogram and Blocking,sed by arithmetic coding as a part of overhead information. Comparing with the existing spatial domain reversible watermark methods, the proposed method can achieve much better PSNR value at the high embedding rate. Experimental results prove the effectiveness of the proposed watermarking scheme.
作者: 整潔    時(shí)間: 2025-3-27 01:22
Ternary Data Hiding Technique for JPEG Steganography,fied matrix encoding (MME). The proposed methods were tested with steganalysis method proposed by T. Pevny and J.Fridrich. The experimental results show that the proposed method has less detectability compared to MME (modified matrix encoding).
作者: 喚起    時(shí)間: 2025-3-27 05:20
0302-9743 ngs of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust water
作者: 2否定    時(shí)間: 2025-3-27 10:23
Kontext: Die Ausgangsbasis der Untersuchungpropose a novel method to detect potential JPEG compression history in bitmap images using the PMF that has been developed. We show that this method outperforms a classical approach to compression history detection in terms of effectiveness. We also show that it detects history with both independent JPEG group (IJG) and custom quantization tables.
作者: PURG    時(shí)間: 2025-3-27 16:09
https://doi.org/10.1007/978-3-322-99729-6m against nine types of attacks like JPEG compression, Gaussian Noise addition, Median Filtering, Salt and Pepper noise, etc. They are carried out using Matlab Software. The experimental results demonstrate that the proposed algorithms have great robustness against various imaging attacks.
作者: PRO    時(shí)間: 2025-3-27 20:21

作者: 保守黨    時(shí)間: 2025-3-27 22:05
Was sind sexuell übertragene Infektionen?detection. Support vector machine (SVM) is used as a classifier to demonstrate the performance of the proposed feature extraction method. Experimental results have shown that that RLRN features extracted from chroma channels provide much better performance than that extracted from R, G, B and luminance channels.
作者: SEEK    時(shí)間: 2025-3-28 05:34
https://doi.org/10.1007/978-3-322-99729-6 low, medium and high frequency quantization noise, and extract high frequency quantization noise for tampered region localization. Post-processing is involved to get final localization result. The experimental results prove the effectiveness of our proposed method.
作者: 組成    時(shí)間: 2025-3-28 07:28
Anforderungen an die Strafverfolgungse of two consecutive bins as a group is exploited for hiding a bit by reassigning their population. The watermarked signals are perceptibly similar to the original one. Comparing with the previous time-domain watermarking scheme?[1], the proposed watermarking method is more robust against additive noise, MP3 compression, low-pass filtering, etc.
作者: evince    時(shí)間: 2025-3-28 12:16

作者: giggle    時(shí)間: 2025-3-28 18:31
Martin Wazlawik,Heinz-Jürgen Vo?,Arne Dekkere small distortion in spatial domain, preserve the histogram of quantized block discrete cosine transform coefficients, and enhance the embedding efficiency of matrix embedding, etc. Consequently, the proposed steganographic scheme has achieved a high security performance. It can resist today’s most powerful JPEG steganalyzers effectively.
作者: DRAFT    時(shí)間: 2025-3-28 21:49
https://doi.org/10.1007/978-3-663-11357-7on results show that ILE scheme can resist more colluders’ interleaving collusion than PSE scheme at moderate-to-high WNR. Theoretical analysis and experimental results demonstrate that the performance of ECC-based fingerprinting with ILE scheme under interleaving collusion is comparable to that under averaging collusion.
作者: 注射器    時(shí)間: 2025-3-29 00:04

作者: 帽子    時(shí)間: 2025-3-29 05:51

作者: PRISE    時(shí)間: 2025-3-29 09:48

作者: Optimum    時(shí)間: 2025-3-29 11:23

作者: ovation    時(shí)間: 2025-3-29 15:53

作者: Palate    時(shí)間: 2025-3-29 21:49
New JPEG Steganographic Scheme with High Security Performance,e small distortion in spatial domain, preserve the histogram of quantized block discrete cosine transform coefficients, and enhance the embedding efficiency of matrix embedding, etc. Consequently, the proposed steganographic scheme has achieved a high security performance. It can resist today’s most powerful JPEG steganalyzers effectively.
作者: FLUSH    時(shí)間: 2025-3-30 00:29

作者: Medley    時(shí)間: 2025-3-30 06:10

作者: FLIT    時(shí)間: 2025-3-30 12:17

作者: Incommensurate    時(shí)間: 2025-3-30 14:20

作者: visceral-fat    時(shí)間: 2025-3-30 20:04
Was sind sexuell übertragene Infektionen?cted in one color space is probably much easier to be detected in another one. In this paper, an efficient approach for passive color image splicing detection is proposed. Chroma spaces are introduced in our work compared with commonly used RGB and luminance spaces. Four gray level run-length run-nu
作者: Misgiving    時(shí)間: 2025-3-30 21:06

作者: 本土    時(shí)間: 2025-3-31 04:07
Sexuell übertragbare Erkrankungen Nowadays, some image scrambling schemes are used as one part of the watermarking algorithm to enhance the security. Therefore, how to select an image scrambling scheme and what kind of the image scrambling scheme may be used for watermarking are the key problems. Evaluation method of the image scra
作者: emulsify    時(shí)間: 2025-3-31 05:56

作者: 滔滔不絕地說    時(shí)間: 2025-3-31 09:33
Kontext: Die Ausgangsbasis der Untersuchunglly, the direction and placement of the encrypted shares is critical when attempting to recover the secret. Many schemes are highly dependant on this stacking order. Within this paper, the scheme presented illustrates a technique whereby this restriction is loosened such that the number of acceptabl
作者: 范圍廣    時(shí)間: 2025-3-31 15:36
Kontext: Die Ausgangsbasis der Untersuchungcal analysis of quantization, with a Generalized Gaussian model being considered as the PDF for non-quantized block DCT coefficients. We subsequently propose a novel method to detect potential JPEG compression history in bitmap images using the PMF that has been developed. We show that this method o
作者: 愚笨    時(shí)間: 2025-3-31 19:07
Beitr?ge zur psychologischen Forschungased counter-measure for rebroadcast attack on a face authentication system becomes feasible. Being able to detect recaptured images, general object recognition can differentiate the objects on a poster from the real ones, so that robot vision is more intelligent. Being able to detect recaptured ima
作者: irradicable    時(shí)間: 2025-4-1 01:02

作者: 發(fā)酵劑    時(shí)間: 2025-4-1 04:23
https://doi.org/10.1007/978-3-322-99729-6image forensics. We propose an algorithm which can locate tampered region(s) in a lossless compressed tampered image when its unchanged region is output of JPEG decompressor. We find the tampered region and the unchanged region have different responses for JPEG compression. The tampered region has s
作者: Magnitude    時(shí)間: 2025-4-1 06:28
Anforderungen an die Strafverfolgungstogram, here we consider the additional ingredient of resisting additive noise-like operations, such as Gaussian noise, lossy compression and low-pass filtering. In other words, we study the problem of the watermark against both TSM and additive noises. To this end, in this paper we extract the his
作者: Engaged    時(shí)間: 2025-4-1 11:20
https://doi.org/10.1007/978-3-322-99729-6omain by modifying one of the scale bands. The detection and extraction procedure do not need the original host image. We tested the proposed algorithm against nine types of attacks like JPEG compression, Gaussian Noise addition, Median Filtering, Salt and Pepper noise, etc. They are carried out usi




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
保靖县| 沧源| 东阳市| 绥德县| 金阳县| 淮阳县| 临江市| 云龙县| 乌什县| 通河县| 宁阳县| 罗定市| 惠来县| 旺苍县| 广元市| 德昌县| 漠河县| 东乌珠穆沁旗| 东方市| 新化县| 上虞市| 阿瓦提县| 弥勒县| 秭归县| 寿阳县| 古浪县| 林芝县| 江山市| 平顶山市| 沙坪坝区| 漠河县| 义乌市| 濉溪县| 钦州市| 唐海县| 舒城县| 沂南县| 临安市| 福州市| 新宁县| 赫章县|