慎重 发表于 2025-3-28 16:13:45
Antony Lewis,Anthony Lasenby,Chris Doranstored. In the proposed scheme, the reconstructed secret image has the same size as the original secret image. There is no pixel expansion. The scheme extends the progressive visual secret sharing (PVSS) to the quantum framework, and the experimental results verify the effectiveness and feasibility of the scheme.转向 发表于 2025-3-28 20:04:57
On ,-Deformations of Clifford Algebrasion mechanism which takes the surrounding valid values as the auxiliary information to focus on the process of depth hole-filling from edge to center. The proposed method achieves competitive performance on existing public datasets.Chagrin 发表于 2025-3-29 02:35:54
Rafał Abłamowicz,Pertti Lounestoults with the previous methods show that the proposed method with EHSA produces total power generation higher and the calculation time faster convergence speed, respectively, than other competitive methods. The proposed method provides a feasible way to solve the optimal dispatching model of cascade reservoir planning in power generation.失望未来 发表于 2025-3-29 06:47:58
https://doi.org/10.1007/978-981-19-1053-1Information Hiding; Multimedia; Signal Processing; IIH-MSP 2021 Proceedings; Network Security; Big Data; CCampaign 发表于 2025-3-29 07:55:33
http://reply.papertrans.cn/15/1486/148522/148522_45.pngANN 发表于 2025-3-29 12:12:14
Jeng-Shyang Pan,Zhenyu Meng,Maria VirvouPresents recent innovative research in the field of information technology.Discusses the outcomes of IIHMSP 2021, held in Kaohsiung, Taiwan.Serves as a reference resource for researchers and practitioorthodox 发表于 2025-3-29 15:59:49
http://reply.papertrans.cn/15/1486/148522/148522_47.png拥护 发表于 2025-3-29 23:22:58
http://reply.papertrans.cn/15/1486/148522/148522_48.pngJUST 发表于 2025-3-30 03:38:25
https://doi.org/10.1007/978-94-015-8090-8fingerprints extracted from audio recordings along with the time stamp data are embedded into audio recordings as watermarks for tamper detection. The decoder uses fingerprints extracted from the audio recording itself to detect tampering. The vector distance between fingerprints obtained from the wPulmonary-Veins 发表于 2025-3-30 07:31:48
J. S. R. Chisholm,R. S. FarwellPHR) generated by the wearable devices in IoMT has become more and more important for the diagnosis and treatment of patients. A PHR sharing model based on Tangle and proxy re-encryption (PRE) is proposed in this paper. In the model, the PHR hash and operation log are stored in the Tangle, and the P