同来核对 发表于 2025-3-28 15:27:03

FMEA Using Fuzzy Digraph and Matrix Approachceable form of transmission. Whether it is the copyright protection of book authors or the prevention of the leakage of confidential documents, there is an urgent need for text watermarking resistant to print-scan attacks. Due to the complex influence of print-scan process and the particularity of t

传授知识 发表于 2025-3-28 22:11:58

https://doi.org/10.1007/978-981-10-1466-6pressed image in encrypted domain. In this paper, a reversible data hiding scheme based on encrypted VQ-compressed image is proposed. On the content owner side, codebook is supposed to be reorganized firstly, and codewords in codebook are then grouped into codeword pair after reorganization. After t

antenna 发表于 2025-3-29 00:48:28

FMEA - Einführung und Moderationouter host names in network-developed areas often imply geographical location information, this paper proposes a city-level landmark evaluation algorithm based on router identification. Firstly, router host name matching rules are formulated by using plenty of network topology information obtained t

束缚 发表于 2025-3-29 03:24:57

http://reply.papertrans.cn/17/1623/162275/162275_44.png

要求比…更好 发表于 2025-3-29 09:09:13

http://reply.papertrans.cn/17/1623/162275/162275_45.png

结束 发表于 2025-3-29 11:29:40

Artificial Intelligence and Security978-3-030-24271-8Series ISSN 0302-9743 Series E-ISSN 1611-3349

易发怒 发表于 2025-3-29 17:30:09

http://reply.papertrans.cn/17/1623/162275/162275_47.png

Affluence 发表于 2025-3-29 22:43:36

http://reply.papertrans.cn/17/1623/162275/162275_48.png

娘娘腔 发表于 2025-3-30 02:58:41

http://reply.papertrans.cn/17/1623/162275/162275_49.png

大约冬季 发表于 2025-3-30 07:38:05

An Improved Steganalysis Method Using Feature Combinationsage. The two parts are combined together to form the new feature set. With the new feature set, the modifications made by steganography can be recognized more efficiently. Experimental results show that the detection accuracy of existing feature extraction methods is increased using the proposed method.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Artificial Intelligence and Security; 5th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2019 Springer Nat