HIKE 发表于 2025-3-30 08:50:41
http://reply.papertrans.cn/28/2794/279337/279337_51.png改正 发表于 2025-3-30 12:28:48
http://reply.papertrans.cn/28/2794/279337/279337_52.png语言学 发表于 2025-3-30 17:25:36
Block-Based Convolutional Neural Network for Image Forgery Detectiond, these visually convincing tampering operations also make authentication of digital images difficult. Therefore, developing a precise and robust method to detect these splicing images is urgently required. In the past, some researchers proposed some methods, which achieves an accuracy of over 97%,assent 发表于 2025-3-30 21:46:27
http://reply.papertrans.cn/28/2794/279337/279337_54.pngGanglion-Cyst 发表于 2025-3-31 03:00:28
http://reply.papertrans.cn/28/2794/279337/279337_55.png鸵鸟 发表于 2025-3-31 07:48:13
Detection of Face Morphing Attacks by Deep Learning and are nowadays standard components in many mobile devices. Thus, many devices can be unlocked via fingerprint or face verification. The state of the art accuracy of biometric facial recognition systems prompted even systems that need high security standards like border control at airports to rely裂隙 发表于 2025-3-31 13:00:02
http://reply.papertrans.cn/28/2794/279337/279337_57.pngPelago 发表于 2025-3-31 14:06:57
Topological Data Analysis for Image Tampering Detectionalysis (TDA) concept of persistent homological invariants associated with certain image features. Image features of interest are pixels that have a uniform Local Binary pattern (LBP) code representing texture feature descriptors. We construct the sequence of simplicial complexes for increasing sequeSTRIA 发表于 2025-3-31 17:40:35
Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Modelfor some important factors in steganography, such as capacity, distortion, is hard to obtain. In this paper, to avoid introducing significant distortion into HEVC video file, a novel HEVC SCM is presented and analyzed. It is firstly proposed that the distortion optimization method in this SCM should