geometrician 发表于 2025-3-28 18:21:12

http://reply.papertrans.cn/28/2794/279334/279334_41.png

vasculitis 发表于 2025-3-28 20:40:03

Generating JPEG Steganographic Adversarial Example via Segmented Adversarial Embeddingure based schemes. Besides steganalysis, CNN model can also be used in steganography. Inheriting the mechanism from adversarial attack to CNN model, adversarial embedding is a kind of steganographic scheme that exploits the knowledge of CNN-based steganalyzer. Adversarial embedding can effectively i

显赫的人 发表于 2025-3-28 23:32:14

High-Performance Linguistic Steganalysis, Capacity Estimation and Steganographic Positioning may bring great challenges in the governance of cyberspace security. The previous linguistic steganalysis methods based on neural networks with word embedding layer could only extract the context-independent word-level features, which are insufficient for capturing the complex semantic dependencies

无所不知 发表于 2025-3-29 06:45:10

http://reply.papertrans.cn/28/2794/279334/279334_44.png

占卜者 发表于 2025-3-29 07:59:19

Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage Detectionuthorized users, trusting that the data will not be disclosed to third parties. Digital watermarking for data leakage detection aims to prevent the unauthorized disclosure of data by imperceptibly marking the data for each authorized user, so that the authorized user can be identified as the data le

捏造 发表于 2025-3-29 14:25:24

Complete Quality Preserving Data Hiding in Animated GIF with Reversibility and Scalable Capacity Funata to be embedded. The newly crafted frame is inserted between 2 existing frames, and the delay time of the affected frames are adjusted accordingly to achieve complete imperceptibility. To the best of our knowledge, this is the first attempt to hide data into an animated GIF by exploiting the tran

保存 发表于 2025-3-29 18:55:16

Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision utilized for visibly labeling the copyright of digital host. To protect the copyright of 3D mesh model, a visible reversible watermarking based on mesh subdivision is proposed in this paper. First, the smooth area of the 3D mesh model is projected onto the 2D plane for cropping and subdivision to a

甜瓜 发表于 2025-3-29 22:46:23

Defocused Image Splicing Localization by Distinguishing Multiple Cues between Raw Naturally Blur ande conducted to partial image regions or splicing edges to promise visual consistency. Revealing the blurring inconsistency among the whole image regions contributes to the splicing detection. However, for the defocused image already containing blur inconsistency, the existing methods cannot work wel

痛苦一生 发表于 2025-3-30 01:21:14

http://reply.papertrans.cn/28/2794/279334/279334_49.png

钉牢 发表于 2025-3-30 05:01:26

http://reply.papertrans.cn/28/2794/279334/279334_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Digital Forensics and Watermarking; 19th International W Xianfeng Zhao,Yun-Qing Shi,Hyoung Joong Kim Conference proceedings 2021 Springer N