HIKE 发表于 2025-3-30 08:50:41

http://reply.papertrans.cn/28/2794/279337/279337_51.png

改正 发表于 2025-3-30 12:28:48

http://reply.papertrans.cn/28/2794/279337/279337_52.png

语言学 发表于 2025-3-30 17:25:36

Block-Based Convolutional Neural Network for Image Forgery Detectiond, these visually convincing tampering operations also make authentication of digital images difficult. Therefore, developing a precise and robust method to detect these splicing images is urgently required. In the past, some researchers proposed some methods, which achieves an accuracy of over 97%,

assent 发表于 2025-3-30 21:46:27

http://reply.papertrans.cn/28/2794/279337/279337_54.png

Ganglion-Cyst 发表于 2025-3-31 03:00:28

http://reply.papertrans.cn/28/2794/279337/279337_55.png

鸵鸟 发表于 2025-3-31 07:48:13

Detection of Face Morphing Attacks by Deep Learning and are nowadays standard components in many mobile devices. Thus, many devices can be unlocked via fingerprint or face verification. The state of the art accuracy of biometric facial recognition systems prompted even systems that need high security standards like border control at airports to rely

裂隙 发表于 2025-3-31 13:00:02

http://reply.papertrans.cn/28/2794/279337/279337_57.png

Pelago 发表于 2025-3-31 14:06:57

Topological Data Analysis for Image Tampering Detectionalysis (TDA) concept of persistent homological invariants associated with certain image features. Image features of interest are pixels that have a uniform Local Binary pattern (LBP) code representing texture feature descriptors. We construct the sequence of simplicial complexes for increasing seque

STRIA 发表于 2025-3-31 17:40:35

Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Modelfor some important factors in steganography, such as capacity, distortion, is hard to obtain. In this paper, to avoid introducing significant distortion into HEVC video file, a novel HEVC SCM is presented and analyzed. It is firstly proposed that the distortion optimization method in this SCM should
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Digital Forensics and Watermarking; 16th International W Christian Kraetzer,Yun-Qing Shi,Hyoung Joong Kim Conference proceedings 2017 Sprin