派博傳思國(guó)際中心

標(biāo)題: Titlebook: Digital Watermarking; 7th International Wo Hyoung-Joong Kim,Stefan Katzenbeisser,Anthony T. S Conference proceedings 2009 Springer-Verlag B [打印本頁(yè)]

作者: 尖酸好    時(shí)間: 2025-3-21 19:36
書目名稱Digital Watermarking影響因子(影響力)




書目名稱Digital Watermarking影響因子(影響力)學(xué)科排名




書目名稱Digital Watermarking網(wǎng)絡(luò)公開度




書目名稱Digital Watermarking網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Digital Watermarking被引頻次




書目名稱Digital Watermarking被引頻次學(xué)科排名




書目名稱Digital Watermarking年度引用




書目名稱Digital Watermarking年度引用學(xué)科排名




書目名稱Digital Watermarking讀者反饋




書目名稱Digital Watermarking讀者反饋學(xué)科排名





作者: brother    時(shí)間: 2025-3-21 21:00

作者: 有常識(shí)    時(shí)間: 2025-3-22 02:03

作者: Resistance    時(shí)間: 2025-3-22 05:30
Benedicte Seynhaeve,Rapha?l Ingelbieng scheme, especially for the print-scanning of high resolution image. This paper proposes an effective pilot-based watermarking algorithm for the print-and-scan process. After careful analysis of the print-and-scan process, the pilot signal and the watermark are embedded and detected in the down-sam
作者: Juvenile    時(shí)間: 2025-3-22 12:47
Paul Yachnin,Myrna Wyatt Selkirkcaling and random cropping, as well as very approving robustness to DA/AD conversion and TSM (Time-Scale Modification). The watermarked audio achieves high auditory quality. Experimental results show that the scheme is very robust to common audio signal processing and distortions introduced in Stirm
作者: 考博    時(shí)間: 2025-3-22 14:01

作者: 考博    時(shí)間: 2025-3-22 20:16

作者: BOOST    時(shí)間: 2025-3-22 22:52

作者: nitroglycerin    時(shí)間: 2025-3-23 01:53
Robust Audio Watermarking Based on Log-Polar Frequency Index,caling and random cropping, as well as very approving robustness to DA/AD conversion and TSM (Time-Scale Modification). The watermarked audio achieves high auditory quality. Experimental results show that the scheme is very robust to common audio signal processing and distortions introduced in Stirm
作者: wangle    時(shí)間: 2025-3-23 08:32
https://doi.org/10.1057/9780230584150y the original image quality is preserved in the watermarked image. Additional advantages of the proposed technique are large capacity of watermark embedding and robustness of the method against different types of image manipulation techniques.
作者: 共同生活    時(shí)間: 2025-3-23 11:26

作者: 粗魯?shù)娜?nbsp;   時(shí)間: 2025-3-23 16:59
Shakespeare Studies and Consciousnessas high embedding capacity while approximately preserving the histogram of quantized DCT coefficients, and the spatial blockiness of stego image has no obvious changes, so the method can resist against histogram-based and blockiness-based steganalysis.
作者: conscience    時(shí)間: 2025-3-23 21:45

作者: Ibd810    時(shí)間: 2025-3-24 00:49

作者: 有害處    時(shí)間: 2025-3-24 06:00

作者: Cytology    時(shí)間: 2025-3-24 08:12
A Robust Watermarking Scheme for H.264,rithm to improve the robustness of the scheme; 3) modify the current block by means of a geometry method, which makes the modifying algorithm degrade the video quality as slightly as possible. Experimental results have demonstrated the good performance of our scheme.
作者: 色情    時(shí)間: 2025-3-24 11:20
A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering,ocalized by the region labeling method. Experimental results demonstrate the proposed method can detect forgery area accurately and reduce the detecting errors when some artificial blur operations are used to create a forgery image.
作者: 歡笑    時(shí)間: 2025-3-24 15:18
Exposure Time Change Attack on Image Watermarking Systems, present the results of the ETC attack against one watermarking scheme Iterative Watermarking Embedding. It can be shown that the ETC attack has an important impact on watermark decoding and detection, while not severely reducing the quality of the image.
作者: 種植,培養(yǎng)    時(shí)間: 2025-3-24 22:10

作者: FOIL    時(shí)間: 2025-3-25 00:11
A Novel Steganographic Algorithm Resisting Targeted Steganalytic Attacks on LSB Matching,sion against existing targeted attacks. The proposed scheme also remains almost undetectable against wavelet absolute moment based blind attack at low embedding rates for never compressed image dataset.
作者: 贊成你    時(shí)間: 2025-3-25 07:00

作者: 他日關(guān)稅重重    時(shí)間: 2025-3-25 11:23

作者: 正式演說    時(shí)間: 2025-3-25 13:41

作者: arthroscopy    時(shí)間: 2025-3-25 16:27
Run-Length and Edge Statistics Based Approach for Image Splicing Detection,ics. The statistical features extracted from image run-length representation and image edge statistics are used for splicing detection. The support vector machine (SVM) is used as the classifier. Our experimental results demonstrate that the two proposed features outperform existing ones both in detection accuracy and computational complexity.
作者: 按等級(jí)    時(shí)間: 2025-3-25 21:27

作者: neolith    時(shí)間: 2025-3-26 02:08

作者: expound    時(shí)間: 2025-3-26 04:51
Conference proceedings 2009n Busan, Korea, in November 2008. The 36 regular papers included in the volume were carefully reviewed and selected from 62 submissions. Areas of interest to the conference are mathematical modeling of embedding and detection; information theoretic, stochastic aspects of data hiding; security issues
作者: 鳥籠    時(shí)間: 2025-3-26 10:54

作者: colony    時(shí)間: 2025-3-26 14:38
Introduction: What’s Wrong with Literature?thin consecutive frames. An algorithm using bootstrapped time series is proposed to exploit this vulnerability. Experimental results demonstrate that this algorithm produces a video with a significantly lower similarity to the given watermarked video using the standard watermark detector.
作者: prostate-gland    時(shí)間: 2025-3-26 19:38
https://doi.org/10.1007/978-1-137-09277-9servation that luminance differential DC components inside one macro block are generally space correlated, so the quantization step can be adjusted according to adjacent differential components, to utilize properties of human visual system (HVS). Experimental results show that it can be implemented in real time with better visual quality.
作者: BLAZE    時(shí)間: 2025-3-26 23:23
Reviving Juliet, Repackaging Romeoalues are slightly modified through shifting the prediction errors. The modified errors are used for embedding the secret data. The experimental results show that the proposed method, called shifted intra prediction error (SIPE), is able of hiding more secret data while the PSNR of the marked image is about 48 dB.
作者: 男生戴手銬    時(shí)間: 2025-3-27 01:24

作者: lavish    時(shí)間: 2025-3-27 06:19

作者: Saline    時(shí)間: 2025-3-27 10:01
A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking,thin consecutive frames. An algorithm using bootstrapped time series is proposed to exploit this vulnerability. Experimental results demonstrate that this algorithm produces a video with a significantly lower similarity to the given watermarked video using the standard watermark detector.
作者: 貴族    時(shí)間: 2025-3-27 15:08

作者: Camouflage    時(shí)間: 2025-3-27 20:51
Reversible Data Hiding Based On H.264/AVC Intra Prediction,alues are slightly modified through shifting the prediction errors. The modified errors are used for embedding the secret data. The experimental results show that the proposed method, called shifted intra prediction error (SIPE), is able of hiding more secret data while the PSNR of the marked image is about 48 dB.
作者: Militia    時(shí)間: 2025-3-28 00:06

作者: 初學(xué)者    時(shí)間: 2025-3-28 06:08

作者: 人類    時(shí)間: 2025-3-28 10:07
https://doi.org/10.1057/9780230119369rithm to improve the robustness of the scheme; 3) modify the current block by means of a geometry method, which makes the modifying algorithm degrade the video quality as slightly as possible. Experimental results have demonstrated the good performance of our scheme.
作者: palpitate    時(shí)間: 2025-3-28 11:07

作者: Phenothiazines    時(shí)間: 2025-3-28 16:24

作者: BORE    時(shí)間: 2025-3-28 22:12

作者: 牢騷    時(shí)間: 2025-3-29 00:30
https://doi.org/10.1057/978-1-137-59541-6sion against existing targeted attacks. The proposed scheme also remains almost undetectable against wavelet absolute moment based blind attack at low embedding rates for never compressed image dataset.
作者: 精美食品    時(shí)間: 2025-3-29 04:01

作者: Nucleate    時(shí)間: 2025-3-29 09:52
Detection of Double MPEG Compression Based on First Digit Statistics,PG compression which often occurs in digital video tampering. The doubly MPEG compressed video will demonstrate different intrinsic characteristics from the MPEG video which is compressed only once. Specifically, the probability distribution of the first digits of the non-zero MPEG quantized AC coef
作者: neutral-posture    時(shí)間: 2025-3-29 11:41
A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking,atermarking techniques is vulnerable to an intra-video collusion attack because it provides grounds to make statistical inference about information within consecutive frames. An algorithm using bootstrapped time series is proposed to exploit this vulnerability. Experimental results demonstrate that
作者: Budget    時(shí)間: 2025-3-29 19:27

作者: 光滑    時(shí)間: 2025-3-29 20:32

作者: 新星    時(shí)間: 2025-3-30 01:29
Scalability Evaluation of Blind Spread-Spectrum Image Watermarking,G coded bitstreams. We develop two multi-channel watermarking schemes with blind detection, based on additive spread-spectrum watermarking: one employs the DCT domain, the other the DWT domain. We obtain watermark scalability by combining detection results from multiple channels modeled by Generaliz
作者: consolidate    時(shí)間: 2025-3-30 04:33

作者: lacrimal-gland    時(shí)間: 2025-3-30 08:17

作者: Erythropoietin    時(shí)間: 2025-3-30 15:19

作者: NEXUS    時(shí)間: 2025-3-30 17:03
Adaptive SVD-Based Digital Image Watermarking,ations have also raised concern about copyright issues and unauthorized modification and distribution of digital data. Digital watermarking techniques which are proposed to solve these problems hide some information in digital media and extract it whenever needed to indicate the data owner. In this
作者: AIL    時(shí)間: 2025-3-30 23:55
Robust Audio Watermarking Based on Log-Polar Frequency Index,verage Fourier magnitude over the log-polar frequency index(.), which can resist these attacks. Theoretical analysis and extensive experiments demonstrate that . is an appropriate embedding region for robust audio watermarking. This is the first work on applying log-polar mapping to audio watermark.
作者: Bricklayer    時(shí)間: 2025-3-31 02:39

作者: 毛細(xì)血管    時(shí)間: 2025-3-31 07:29

作者: 環(huán)形    時(shí)間: 2025-3-31 11:13
Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient,ficial feather operation, which is necessary to create a smooth transition between a forged image region and its surroundings. The local entropy of the gradient is used to determine the forged region, and the credibility is computed to show the reality level of the image. Results of experiments on s
作者: biopsy    時(shí)間: 2025-3-31 15:25

作者: Acumen    時(shí)間: 2025-3-31 21:21

作者: 推延    時(shí)間: 2025-3-31 21:51

作者: canonical    時(shí)間: 2025-4-1 02:37
A Novel Approach for JPEG Steganography,nts 1 or -1. The candidates for removing and inserting are searched among all non rounded AC coefficients after quantization. The proposed search technique flags the most appropriate coefficients, which provide less degradation after modification. The proposed data hiding technique based on the modi
作者: 玉米    時(shí)間: 2025-4-1 08:00
A High Capacity Steganographic Algorithm in Color Images,icients at the same frequency in YUV components are selected respectively to compose a triplet as the message carrier, then decide the embedding capacity in each triplet according to the property of the triplet. The modulus 2 or modulus 4 arithmetic operations are applied to the valid triplet to emb
作者: 一小塊    時(shí)間: 2025-4-1 10:36

作者: 不能妥協(xié)    時(shí)間: 2025-4-1 16:15

作者: 賞錢    時(shí)間: 2025-4-1 19:12
Introduction: What’s Wrong with Literature?atermarking techniques is vulnerable to an intra-video collusion attack because it provides grounds to make statistical inference about information within consecutive frames. An algorithm using bootstrapped time series is proposed to exploit this vulnerability. Experimental results demonstrate that




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
南江县| 慈利县| 鄂托克旗| 乌恰县| 双江| 兰西县| 庄浪县| 运城市| 兴国县| 宜章县| 井冈山市| 大竹县| 博湖县| 响水县| 五家渠市| 临邑县| 界首市| 卓资县| 嘉义县| 酒泉市| 新泰市| 通渭县| 通化县| 佛山市| 马山县| 昔阳县| 高淳县| 嵊泗县| 达尔| 皮山县| 常德市| 鹿泉市| 蓝山县| 巴中市| 星座| 柏乡县| 龙江县| 宜川县| 靖边县| 柯坪县| 眉山市|