监督 发表于 2025-3-21 19:30:20

书目名称Cloud Computing and Security影响因子(影响力)<br>        http://impactfactor.cn/2024/if/?ISSN=BK0228430<br><br>        <br><br>书目名称Cloud Computing and Security影响因子(影响力)学科排名<br>        http://impactfactor.cn/2024/ifr/?ISSN=BK0228430<br><br>        <br><br>书目名称Cloud Computing and Security网络公开度<br>        http://impactfactor.cn/2024/at/?ISSN=BK0228430<br><br>        <br><br>书目名称Cloud Computing and Security网络公开度学科排名<br>        http://impactfactor.cn/2024/atr/?ISSN=BK0228430<br><br>        <br><br>书目名称Cloud Computing and Security被引频次<br>        http://impactfactor.cn/2024/tc/?ISSN=BK0228430<br><br>        <br><br>书目名称Cloud Computing and Security被引频次学科排名<br>        http://impactfactor.cn/2024/tcr/?ISSN=BK0228430<br><br>        <br><br>书目名称Cloud Computing and Security年度引用<br>        http://impactfactor.cn/2024/ii/?ISSN=BK0228430<br><br>        <br><br>书目名称Cloud Computing and Security年度引用学科排名<br>        http://impactfactor.cn/2024/iir/?ISSN=BK0228430<br><br>        <br><br>书目名称Cloud Computing and Security读者反馈<br>        http://impactfactor.cn/2024/5y/?ISSN=BK0228430<br><br>        <br><br>书目名称Cloud Computing and Security读者反馈学科排名<br>        http://impactfactor.cn/2024/5yr/?ISSN=BK0228430<br><br>        <br><br>

只有 发表于 2025-3-22 00:03:24

http://reply.papertrans.cn/23/2285/228430/228430_2.png

清洗 发表于 2025-3-22 01:19:21

https://doi.org/10.1007/978-3-642-99726-6 a few degradations in terms of visual quality and keep a small variation in bit-rate increase. Experimental results have verified that the proposed method has no significant degradation in terms of visual quality (i.e., PSNR and SSIM) and indeed obtains a very small variation in bit-rate increase.

Detain 发表于 2025-3-22 07:12:40

https://doi.org/10.1007/978-3-642-51986-4 extracting procedures are implemented via these basic interactions, in which texts, pictures, voices or videos are used as carriers. With the features of language diversification, common media, real-time in an instant message communication, the proposed steganography in this paper is flexible, secure and reliable.

Preamble 发表于 2025-3-22 10:30:14

http://reply.papertrans.cn/23/2285/228430/228430_5.png

运动的我 发表于 2025-3-22 14:57:59

Threshold Proxy Re-encryption and Its Application in Blockchainoved secure by using the intractability of discrete logarithms. This paper presents a consortium blockchain access permission scheme, which is built on the threshold proxy re-encryption scheme. When a new node joins a consortium blockchain, an access permission is achieved by the agreement on other existing nodes, instead of a centralized CA.

运动的我 发表于 2025-3-22 19:43:59

A Data Hiding Scheme with High Quality for H.264/AVC Video Streams a few degradations in terms of visual quality and keep a small variation in bit-rate increase. Experimental results have verified that the proposed method has no significant degradation in terms of visual quality (i.e., PSNR and SSIM) and indeed obtains a very small variation in bit-rate increase.

匍匐前进 发表于 2025-3-23 00:59:01

http://reply.papertrans.cn/23/2285/228430/228430_8.png

不能逃避 发表于 2025-3-23 03:11:25

A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hidifixed parameters predictors through simple arithmetic combination of its surroundings pixel, experimental results show that the proposed method can provide a sparser prediction-error image for data embedding, and thus improves the performance of RDH more effectively than those state-of-the-art error prediction algorithms.

闲荡 发表于 2025-3-23 06:38:09

http://reply.papertrans.cn/23/2285/228430/228430_10.png
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit