ARRAY 发表于 2025-3-21 18:45:48

书目名称Information Hiding影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465061<br><br>        <br><br>书目名称Information Hiding影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465061<br><br>        <br><br>书目名称Information Hiding网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465061<br><br>        <br><br>书目名称Information Hiding网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465061<br><br>        <br><br>书目名称Information Hiding被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465061<br><br>        <br><br>书目名称Information Hiding被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465061<br><br>        <br><br>书目名称Information Hiding年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465061<br><br>        <br><br>书目名称Information Hiding年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465061<br><br>        <br><br>书目名称Information Hiding读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465061<br><br>        <br><br>书目名称Information Hiding读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465061<br><br>        <br><br>

王得到 发表于 2025-3-21 22:57:31

Towards Joint Tardos Decoding: The ‘Don Quixote’ Algorithmrobability of false positive is controlled thanks to a rare event estimator. We describe a fast implementation supporting millions of users and compare our results with two recent fingerprinting codes.

欺骗世家 发表于 2025-3-22 03:04:17

An Asymmetric Fingerprinting Scheme Based on Tardos Codeshat is only known to the Provider. This knowledge allows an untrustworthy Provider to attack traditional asymmetric fingerprinting protocols. We describe this attack, and then propose a new asymmetric fingerprinting protocol, specifically designed for Tardos codes.

青少年 发表于 2025-3-22 07:31:08

Anonymity Attacks on Mix Systems: A Formal Analysisation, KLSD, and Min-entropy) which revealed interesting findings about some mix variants. This paper tries to bridge the gap between theory and practice in the field of anonymous communication systems.

MAIZE 发表于 2025-3-22 12:10:54

http://reply.papertrans.cn/47/4651/465061/465061_5.png

讲个故事逗他 发表于 2025-3-22 15:33:59

http://reply.papertrans.cn/47/4651/465061/465061_6.png

Contort 发表于 2025-3-22 19:58:59

Conference proceedings 2011 in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest..

男学院 发表于 2025-3-22 22:46:36

Asymptotic Fingerprinting Capacity for Non-binary Alphabets 2ln .). Our proof technique does not reveal the optimal attack or bias distribution. The fact that the capacity is an increasing function of . shows that there is a real gain in going to non-binary alphabets.

Consensus 发表于 2025-3-23 03:58:29

http://reply.papertrans.cn/47/4651/465061/465061_9.png

V切开 发表于 2025-3-23 07:10:53

http://reply.papertrans.cn/47/4651/465061/465061_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Hiding; 13th International C Tomáš Filler,Tomáš Pevný,Andrew Ker Conference proceedings 2011 Springer-Verlag GmbH Berlin Heidel