否认 发表于 2025-3-28 17:26:15

http://reply.papertrans.cn/16/1597/159682/159682_41.png

mechanism 发表于 2025-3-28 21:24:05

2194-5357 Includes theories and applications to provide design, analys.This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, Ind

MORT 发表于 2025-3-28 23:53:11

http://reply.papertrans.cn/16/1597/159682/159682_43.png

Anthrp 发表于 2025-3-29 04:42:05

http://reply.papertrans.cn/16/1597/159682/159682_44.png

Defiance 发表于 2025-3-29 10:07:17

Kurosh Madani,Ghislain de Tremiollesmage to enhance the chance of restoration of the image from different cropping attack-based tampers. The validity and superiority of the proposed scheme is verified through extensive simulations using different images of two extensively used image databases.
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Applied Computation and Security Systems; Volume Two Rituparna Chaki,Khalid Saeed,Nabendu Chaki Book 2015 Springer India 2015 Biometrics-ba