ciliary-body
发表于 2025-3-25 03:19:46
http://reply.papertrans.cn/28/2799/279895/279895_21.png
CRP743
发表于 2025-3-25 07:46:44
(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDWWe analyze the security of a fingerprinting scheme proposed at IWDW 2005. We show two results, namely that this scheme (1) does not provide .: a dishonest buyer can repudiate the fact that he redistributed a content, and (2) does not provide .: a buyer can be framed by a malicious seller.
有危险
发表于 2025-3-25 14:57:20
http://reply.papertrans.cn/28/2799/279895/279895_23.png
压碎
发表于 2025-3-25 18:04:52
Reversible Data Hiding Using Prediction Error Values Embeddingations, we propose an even- and odd-number-based embedding method. This method is implemented in a prediction error image. The experimental results show that our embedding method can achieve satisfactory embedding capacity and image quality.
Microaneurysm
发表于 2025-3-25 22:20:27
http://reply.papertrans.cn/28/2799/279895/279895_25.png
Jogging
发表于 2025-3-26 01:24:47
Digital Watermarking978-3-540-92238-4Series ISSN 0302-9743 Series E-ISSN 1611-3349
HARD
发表于 2025-3-26 05:59:12
https://doi.org/10.1007/978-3-030-33958-6ations, we propose an even- and odd-number-based embedding method. This method is implemented in a prediction error image. The experimental results show that our embedding method can achieve satisfactory embedding capacity and image quality.
cancer
发表于 2025-3-26 09:41:51
http://reply.papertrans.cn/28/2799/279895/279895_28.png
臭了生气
发表于 2025-3-26 13:12:03
http://reply.papertrans.cn/28/2799/279895/279895_29.png
OATH
发表于 2025-3-26 18:27:18
Multiple Watermarking in Visual Cryptographye. In watermark extraction, only Exclusive-OR operation is needed, and basic properties of conventional visual cryptography technique are still preserved. Experimental results show the effectiveness of our schemes.