作业 发表于 2025-3-21 18:30:50
书目名称Digital-Forensics and Watermarking影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0279923<br><br> <br><br>书目名称Digital-Forensics and Watermarking影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0279923<br><br> <br><br>书目名称Digital-Forensics and Watermarking网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0279923<br><br> <br><br>书目名称Digital-Forensics and Watermarking网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0279923<br><br> <br><br>书目名称Digital-Forensics and Watermarking被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0279923<br><br> <br><br>书目名称Digital-Forensics and Watermarking被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0279923<br><br> <br><br>书目名称Digital-Forensics and Watermarking年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0279923<br><br> <br><br>书目名称Digital-Forensics and Watermarking年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0279923<br><br> <br><br>书目名称Digital-Forensics and Watermarking读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0279923<br><br> <br><br>书目名称Digital-Forensics and Watermarking读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0279923<br><br> <br><br>屈尊 发表于 2025-3-21 21:00:56
http://reply.papertrans.cn/28/2800/279923/279923_2.pngHIKE 发表于 2025-3-22 03:22:47
Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited can resist blind steganalysis but is vulnerable to the targeted attack proposed by Tan .. In this paper, we introduce an improved version of APVD. Like APVD, we also first divide an image into some non-overlapping squares and then rotate each of them by a random degree of 0, 90, 180 or 270. For an英寸 发表于 2025-3-22 06:39:46
http://reply.papertrans.cn/28/2800/279923/279923_4.pngMOAT 发表于 2025-3-22 09:44:35
http://reply.papertrans.cn/28/2800/279923/279923_5.pngAccede 发表于 2025-3-22 14:12:11
Improved Tagged Visual Cryptograms by Using Random Gridsfolding up each single share, the associated tagged pattern is visually revealed. Such additional tag patterns greatly enrich extra abilities of VC, such as augmented message carried in a single share, user-friendly interface to manage the shares, and/or evidence for verifying consistency among thosAccede 发表于 2025-3-22 20:53:07
http://reply.papertrans.cn/28/2800/279923/279923_7.pnglesion 发表于 2025-3-22 22:01:17
http://reply.papertrans.cn/28/2800/279923/279923_8.png蒙太奇 发表于 2025-3-23 03:49:05
Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusionosed scheme is designed to share a secret binary image, such as text image or natural image, into . EDBTC-compressed images including meaningful contents. The compressed shadows generated by our proposed scheme have good visual quality and no pixel expansion, which are beneficial to reduce suspicionGRIPE 发表于 2025-3-23 09:00:03
Reversible Data Hiding in Encrypted H.264/AVC Video Streams this paper, a reversible data hiding scheme in encrypted H.264/AVC video streams is proposed. During H.264/AVC encoding, the intra-prediction mode (IPM), motion vector difference (MVD), and residue coefficients’ signs are encrypted using a standard stream cipher. Then, the data-hider, who does not