evanescent 发表于 2025-3-28 16:31:06

http://reply.papertrans.cn/28/2794/279331/279331_41.png

口诀法 发表于 2025-3-28 19:45:39

http://reply.papertrans.cn/28/2794/279331/279331_42.png

注入 发表于 2025-3-28 23:34:11

Resilienz als Erfolgsfaktor im Tourismus each block, the watermarks include the total-watermark with variable number of bits and the basic-watermark of length 24 bits. The two watermark versions of each block are embedded into the less significant bit planes of the different blocks based on the secret key, respectively. They not only can

惊呼 发表于 2025-3-29 03:30:49

http://reply.papertrans.cn/28/2794/279331/279331_44.png

antecedence 发表于 2025-3-29 07:17:48

https://doi.org/10.1007/978-3-658-38270-4 embed information for covert communication. So in this paper, we present three novel data hiding algorithms based on incremental updates which can provide large enough embedding capacity without any change of file display. These algorithms embed information by different covert channels and the logi

上腭 发表于 2025-3-29 13:26:14

Henrik Schultz,Hubertus von Dresslerrmark pattern is designed that is sensitive to image processing specific to illegal copying. This is done on the basis of the aliasing effect, which causes image distortion when the re-sampling frequency is low. Watermarks using such patterns are embedded in the original video. They become visible o

obligation 发表于 2025-3-29 17:55:08

Henrik Schultz,Hubertus von Dresslerber of participants. The secrets are in the form of an image that is encoded into multiple pieces known as shares. When these shares are physically superimposed, the secret can be instantly observed. A known problem is that of authentication. How is it possible to know that the secret being recovere

foliage 发表于 2025-3-29 22:23:16

http://reply.papertrans.cn/28/2794/279331/279331_48.png

军械库 发表于 2025-3-30 01:18:49

http://reply.papertrans.cn/28/2794/279331/279331_49.png

爵士乐 发表于 2025-3-30 04:03:09

Digital Forensics and Watermarking978-3-642-32205-1Series ISSN 0302-9743 Series E-ISSN 1611-3349
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Digital Forensics and Watermarking; 10th International W Yun Qing Shi,Hyoung-Joong Kim,Fernando Perez-Gonza Conference proceedings 2012 Spr