监督 发表于 2025-3-21 19:30:20
书目名称Cloud Computing and Security影响因子(影响力)<br> http://impactfactor.cn/2024/if/?ISSN=BK0228430<br><br> <br><br>书目名称Cloud Computing and Security影响因子(影响力)学科排名<br> http://impactfactor.cn/2024/ifr/?ISSN=BK0228430<br><br> <br><br>书目名称Cloud Computing and Security网络公开度<br> http://impactfactor.cn/2024/at/?ISSN=BK0228430<br><br> <br><br>书目名称Cloud Computing and Security网络公开度学科排名<br> http://impactfactor.cn/2024/atr/?ISSN=BK0228430<br><br> <br><br>书目名称Cloud Computing and Security被引频次<br> http://impactfactor.cn/2024/tc/?ISSN=BK0228430<br><br> <br><br>书目名称Cloud Computing and Security被引频次学科排名<br> http://impactfactor.cn/2024/tcr/?ISSN=BK0228430<br><br> <br><br>书目名称Cloud Computing and Security年度引用<br> http://impactfactor.cn/2024/ii/?ISSN=BK0228430<br><br> <br><br>书目名称Cloud Computing and Security年度引用学科排名<br> http://impactfactor.cn/2024/iir/?ISSN=BK0228430<br><br> <br><br>书目名称Cloud Computing and Security读者反馈<br> http://impactfactor.cn/2024/5y/?ISSN=BK0228430<br><br> <br><br>书目名称Cloud Computing and Security读者反馈学科排名<br> http://impactfactor.cn/2024/5yr/?ISSN=BK0228430<br><br> <br><br>只有 发表于 2025-3-22 00:03:24
http://reply.papertrans.cn/23/2285/228430/228430_2.png清洗 发表于 2025-3-22 01:19:21
https://doi.org/10.1007/978-3-642-99726-6 a few degradations in terms of visual quality and keep a small variation in bit-rate increase. Experimental results have verified that the proposed method has no significant degradation in terms of visual quality (i.e., PSNR and SSIM) and indeed obtains a very small variation in bit-rate increase.Detain 发表于 2025-3-22 07:12:40
https://doi.org/10.1007/978-3-642-51986-4 extracting procedures are implemented via these basic interactions, in which texts, pictures, voices or videos are used as carriers. With the features of language diversification, common media, real-time in an instant message communication, the proposed steganography in this paper is flexible, secure and reliable.Preamble 发表于 2025-3-22 10:30:14
http://reply.papertrans.cn/23/2285/228430/228430_5.png运动的我 发表于 2025-3-22 14:57:59
Threshold Proxy Re-encryption and Its Application in Blockchainoved secure by using the intractability of discrete logarithms. This paper presents a consortium blockchain access permission scheme, which is built on the threshold proxy re-encryption scheme. When a new node joins a consortium blockchain, an access permission is achieved by the agreement on other existing nodes, instead of a centralized CA.运动的我 发表于 2025-3-22 19:43:59
A Data Hiding Scheme with High Quality for H.264/AVC Video Streams a few degradations in terms of visual quality and keep a small variation in bit-rate increase. Experimental results have verified that the proposed method has no significant degradation in terms of visual quality (i.e., PSNR and SSIM) and indeed obtains a very small variation in bit-rate increase.匍匐前进 发表于 2025-3-23 00:59:01
http://reply.papertrans.cn/23/2285/228430/228430_8.png不能逃避 发表于 2025-3-23 03:11:25
A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hidifixed parameters predictors through simple arithmetic combination of its surroundings pixel, experimental results show that the proposed method can provide a sparser prediction-error image for data embedding, and thus improves the performance of RDH more effectively than those state-of-the-art error prediction algorithms.闲荡 发表于 2025-3-23 06:38:09
http://reply.papertrans.cn/23/2285/228430/228430_10.png