心胸狭窄 发表于 2025-3-28 16:51:55

Coverless Information Hiding Technology Research Based on News Aggregationhides N in a news web by changing the order of news headlines. Experimental results and analysis show that this method is robust for any current steganalysis algorithm, and effective for stego-message delivery.

arthroplasty 发表于 2025-3-28 21:33:20

http://reply.papertrans.cn/23/2285/228428/228428_42.png

countenance 发表于 2025-3-29 01:17:14

http://reply.papertrans.cn/23/2285/228428/228428_43.png

熄灭 发表于 2025-3-29 03:47:46

http://reply.papertrans.cn/23/2285/228428/228428_44.png

Perceive 发表于 2025-3-29 10:14:07

http://reply.papertrans.cn/23/2285/228428/228428_45.png

Parameter 发表于 2025-3-29 13:18:48

https://doi.org/10.34157/9783648157725ography method based on patched block. This strategy can make the post-processing sub-image be influenced by all the sub-images which have already embedded. The experimental results show that the proposed method is more secure than CMD image steganographic method.

indignant 发表于 2025-3-29 18:54:49

Schnellfilter ihr Bau und Betrieb by reference the technique for order preference by similarity to an ideal solution (TOPSIS) theory, 2 kinds of service selection algorithm are designed to obtain the optimal service reflecting user’s QoS needs. The last, some experiments demonstrate the superiority and efficiency of our approach.

Cosmopolitan 发表于 2025-3-29 22:37:31

Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling Experimental results show that the proposed scheme can not only provide large watermark capacity and good imperceptibility, but also can resist the impact of print-scan on the image, and has strong robustness.

synovium 发表于 2025-3-30 02:49:50

http://reply.papertrans.cn/23/2285/228428/228428_49.png

贪婪的人 发表于 2025-3-30 05:00:50

Parallel Service Selection Method Based on Adaptive Cloud Model for Mobile Application by reference the technique for order preference by similarity to an ideal solution (TOPSIS) theory, 2 kinds of service selection algorithm are designed to obtain the optimal service reflecting user’s QoS needs. The last, some experiments demonstrate the superiority and efficiency of our approach.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Cloud Computing and Security; Third International Xingming Sun,Han-Chieh Chao,Elisa Bertino Conference proceedings 2017 Springer Internati