障碍物 发表于 2025-3-23 11:21:34

http://reply.papertrans.cn/28/2799/279890/279890_11.png

不安 发表于 2025-3-23 17:41:46

http://reply.papertrans.cn/28/2799/279890/279890_12.png

相互影响 发表于 2025-3-23 18:49:04

http://reply.papertrans.cn/28/2799/279890/279890_13.png

DAFT 发表于 2025-3-23 23:50:20

http://reply.papertrans.cn/28/2799/279890/279890_14.png

COW 发表于 2025-3-24 05:19:05

http://reply.papertrans.cn/28/2799/279890/279890_15.png

能够支付 发表于 2025-3-24 08:03:23

http://reply.papertrans.cn/28/2799/279890/279890_16.png

阻碍 发表于 2025-3-24 12:17:03

Ternary Data Hiding Technique for JPEG Steganography, coefficient is converted to the corresponding ternary coefficient. The block of 3. − 1 ternary coefficients is used for hiding . ternary messages by modifying one or two coefficients. Due to higher information density of the ternary coefficients, the proposed method has many solutions for hiding ne

新义 发表于 2025-3-24 18:11:42

Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting, embedding (PSE) scheme has provided better interleaving collusion resistance than conventional scheme, our study shows that the resistance is still weaker than that under averaging collusion at moderate-to-high watermark-to-noise ratio (WNR). We then propose interleaving embedding (ILE) scheme to e

做事过头 发表于 2025-3-24 19:39:32

A Novel Collusion Attack Strategy for Digital Fingerprinting,for unintended purpose. A cost-efficient attack against digital fingerprinting, known as collusion attack, involves a group of users who combine their fingerprinted content for the purpose of attenuating or removing the fingerprints. In this paper, we analyze and simulate the effect of Gaussian nois

与野兽博斗者 发表于 2025-3-25 00:47:49

http://reply.papertrans.cn/28/2799/279890/279890_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Digital Watermarking; 9th International Wo Hyoung-Joong Kim,Yun Qing Shi,Mauro Barni Conference proceedings 2011 Springer Berlin Heidelberg