Grasping 发表于 2025-3-28 18:38:55

https://doi.org/10.1007/978-3-663-07997-2logy to protect copyright information, and proposes a scheme utilizes the support vector machine (SVM) based on posterior probability and the optimized genetic algorithm (GA). Firstly, each training image is divided into sub-blocks of 8 * 8 pixels, and they are trained and classified by the SVM to o

Carcinoma 发表于 2025-3-28 20:11:16

The Research of Cryptosystem Recognition Based on Randomness Test’s Return Valuecryptosystem recognition applications. And we also conduct further analysis: (a) analyze some features’ recognition performance, and find the relation of some feature’s recognition accuracies and cryptosystem. (b) compared with existed features, part of new features maintain high recognition accurac

会议 发表于 2025-3-28 23:26:12

VideoChain: Trusted Video Surveillance Based on Blockchain for Campusion scenario. The analysis shows that VideoChain is traceable and non-tampering, which can effectively ensure the credibility of video surveillance data. It also has good operational efficiency. This research is of great significance to enhance the trust between the government and citizens, which wi

阻止 发表于 2025-3-29 04:02:06

A Blind Quantization Watermarking Scheme for Screen Content Imager a wide variety of image contents, including texts, graphics, symbols, patterns, and natural images. Experiments show that our method has a good performance in term of robustness and better visual quality.

过分 发表于 2025-3-29 07:26:08

http://reply.papertrans.cn/23/2285/228430/228430_45.png

venous-leak 发表于 2025-3-29 12:28:51

http://reply.papertrans.cn/23/2285/228430/228430_46.png

ostrish 发表于 2025-3-29 17:40:29

A Multiple Watermarking Scheme for Content Authentication of OOXML Format Documents synonym substitutions has a strong robustness against the attacks on formats and the content. However, the double fragile watermarking methods can sensitively perceive tampers in the content and formats of the watermarked document, and predict the type of tampers with capability of locating the tam

sigmoid-colon 发表于 2025-3-29 22:30:59

http://reply.papertrans.cn/23/2285/228430/228430_48.png

暴露他抗议 发表于 2025-3-30 02:46:32

http://reply.papertrans.cn/23/2285/228430/228430_49.png

IST 发表于 2025-3-30 07:03:54

A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GAmpared with the experimental results of other algorithms, the proposed scheme has better resistance against some common attacks, such as Histogram Equalization, Guassian Noise (0.04), Guassian Noise (0.05), JPEG (QF = 50), Salt-pepper Noise (0.01).
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit