ciliary-body 发表于 2025-3-25 03:19:46
http://reply.papertrans.cn/28/2799/279895/279895_21.pngCRP743 发表于 2025-3-25 07:46:44
(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDWWe analyze the security of a fingerprinting scheme proposed at IWDW 2005. We show two results, namely that this scheme (1) does not provide .: a dishonest buyer can repudiate the fact that he redistributed a content, and (2) does not provide .: a buyer can be framed by a malicious seller.有危险 发表于 2025-3-25 14:57:20
http://reply.papertrans.cn/28/2799/279895/279895_23.png压碎 发表于 2025-3-25 18:04:52
Reversible Data Hiding Using Prediction Error Values Embeddingations, we propose an even- and odd-number-based embedding method. This method is implemented in a prediction error image. The experimental results show that our embedding method can achieve satisfactory embedding capacity and image quality.Microaneurysm 发表于 2025-3-25 22:20:27
http://reply.papertrans.cn/28/2799/279895/279895_25.pngJogging 发表于 2025-3-26 01:24:47
Digital Watermarking978-3-540-92238-4Series ISSN 0302-9743 Series E-ISSN 1611-3349HARD 发表于 2025-3-26 05:59:12
https://doi.org/10.1007/978-3-030-33958-6ations, we propose an even- and odd-number-based embedding method. This method is implemented in a prediction error image. The experimental results show that our embedding method can achieve satisfactory embedding capacity and image quality.cancer 发表于 2025-3-26 09:41:51
http://reply.papertrans.cn/28/2799/279895/279895_28.png臭了生气 发表于 2025-3-26 13:12:03
http://reply.papertrans.cn/28/2799/279895/279895_29.pngOATH 发表于 2025-3-26 18:27:18
Multiple Watermarking in Visual Cryptographye. In watermark extraction, only Exclusive-OR operation is needed, and basic properties of conventional visual cryptography technique are still preserved. Experimental results show the effectiveness of our schemes.