作业 发表于 2025-3-21 18:30:50

书目名称Digital-Forensics and Watermarking影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0279923<br><br>        <br><br>书目名称Digital-Forensics and Watermarking影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0279923<br><br>        <br><br>书目名称Digital-Forensics and Watermarking网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0279923<br><br>        <br><br>书目名称Digital-Forensics and Watermarking网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0279923<br><br>        <br><br>书目名称Digital-Forensics and Watermarking被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0279923<br><br>        <br><br>书目名称Digital-Forensics and Watermarking被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0279923<br><br>        <br><br>书目名称Digital-Forensics and Watermarking年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0279923<br><br>        <br><br>书目名称Digital-Forensics and Watermarking年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0279923<br><br>        <br><br>书目名称Digital-Forensics and Watermarking读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0279923<br><br>        <br><br>书目名称Digital-Forensics and Watermarking读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0279923<br><br>        <br><br>

屈尊 发表于 2025-3-21 21:00:56

http://reply.papertrans.cn/28/2800/279923/279923_2.png

HIKE 发表于 2025-3-22 03:22:47

Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited can resist blind steganalysis but is vulnerable to the targeted attack proposed by Tan .. In this paper, we introduce an improved version of APVD. Like APVD, we also first divide an image into some non-overlapping squares and then rotate each of them by a random degree of 0, 90, 180 or 270. For an

英寸 发表于 2025-3-22 06:39:46

http://reply.papertrans.cn/28/2800/279923/279923_4.png

MOAT 发表于 2025-3-22 09:44:35

http://reply.papertrans.cn/28/2800/279923/279923_5.png

Accede 发表于 2025-3-22 14:12:11

Improved Tagged Visual Cryptograms by Using Random Gridsfolding up each single share, the associated tagged pattern is visually revealed. Such additional tag patterns greatly enrich extra abilities of VC, such as augmented message carried in a single share, user-friendly interface to manage the shares, and/or evidence for verifying consistency among thos

Accede 发表于 2025-3-22 20:53:07

http://reply.papertrans.cn/28/2800/279923/279923_7.png

lesion 发表于 2025-3-22 22:01:17

http://reply.papertrans.cn/28/2800/279923/279923_8.png

蒙太奇 发表于 2025-3-23 03:49:05

Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusionosed scheme is designed to share a secret binary image, such as text image or natural image, into . EDBTC-compressed images including meaningful contents. The compressed shadows generated by our proposed scheme have good visual quality and no pixel expansion, which are beneficial to reduce suspicion

GRIPE 发表于 2025-3-23 09:00:03

Reversible Data Hiding in Encrypted H.264/AVC Video Streams this paper, a reversible data hiding scheme in encrypted H.264/AVC video streams is proposed. During H.264/AVC encoding, the intra-prediction mode (IPM), motion vector difference (MVD), and residue coefficients’ signs are encrypted using a standard stream cipher. Then, the data-hider, who does not
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Digital-Forensics and Watermarking; 12th International W Yun Qing Shi,Hyoung-Joong Kim,Fernando Pérez-Gonzá Conference proceedings 2014 Spr