canonical 发表于 2025-4-1 02:37:14

A Novel Approach for JPEG Steganography,nts 1 or -1. The candidates for removing and inserting are searched among all non rounded AC coefficients after quantization. The proposed search technique flags the most appropriate coefficients, which provide less degradation after modification. The proposed data hiding technique based on the modi

玉米 发表于 2025-4-1 08:00:25

A High Capacity Steganographic Algorithm in Color Images,icients at the same frequency in YUV components are selected respectively to compose a triplet as the message carrier, then decide the embedding capacity in each triplet according to the property of the triplet. The modulus 2 or modulus 4 arithmetic operations are applied to the valid triplet to emb

一小块 发表于 2025-4-1 10:36:33

http://reply.papertrans.cn/28/2799/279894/279894_63.png

不能妥协 发表于 2025-4-1 16:15:01

http://reply.papertrans.cn/28/2799/279894/279894_64.png

赏钱 发表于 2025-4-1 19:12:21

Introduction: What’s Wrong with Literature?atermarking techniques is vulnerable to an intra-video collusion attack because it provides grounds to make statistical inference about information within consecutive frames. An algorithm using bootstrapped time series is proposed to exploit this vulnerability. Experimental results demonstrate that
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Digital Watermarking; 7th International Wo Hyoung-Joong Kim,Stefan Katzenbeisser,Anthony T. S Conference proceedings 2009 Springer-Verlag B