血友病 发表于 2025-3-26 23:40:57
An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positiveemonstrate how to mix those two codes to inherit both of their advantages. The resulting 2-secure codes have short lengths, and possess the above characteristics whenever the number of pirates (may exceed two but) is not too large.elucidate 发表于 2025-3-27 04:59:09
Embedding Ratio Estimating for Each Bit Plane of Images significance. A series of experiments show that the presented steganalysis method has significantly smaller bias than applying SPA method, a typical steganalysis for LSB steganography, to estimate the embedding ratio in each bit plane directly.CT-angiography 发表于 2025-3-27 09:11:42
A Phase Modulation Audio Watermarking Techniquehich among other features provides evidence for high audio quality. The system combines the alteration of the phase with the spread spectrum concept and is referred to as Adaptive Spread Phase Modulation (ASPM). Extensive benchmarking provide the evidence for the inaudibility of the embedded watermark and the good robustness.真 发表于 2025-3-27 11:58:09
http://reply.papertrans.cn/47/4651/465068/465068_34.pngaesthetician 发表于 2025-3-27 17:28:13
Estimating the Minimal Length of Tardos Codey that an innocent user is framed, and the probabilities that all colluders are missed. Therefore, for a given collusion size, we are able to estimate the minimal length of the code satisfying some error probabilities constraints. This estimation is far lower than the known lower bounds.orient 发表于 2025-3-27 19:47:45
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions, parallelism, and provably correct partial simulation enables 10. advantage of communicating parties over an attacker, requiring over 500 of years of computation even if the attacker uses all global computation resources.Dysarthria 发表于 2025-3-28 01:04:15
Detect Digital Image Splicing with Visual Cuesarpness as visual cues. We exploit this idea to develope a digital image splicing detection system with high performance. We present experimental results which show that the proposed system outperforms the prior arts. An additional advantage offered by the proposed system is that it provides a convenient way of localizing the splicing boundaries.观点 发表于 2025-3-28 04:31:47
An Epistemological Approach to Steganographyplifying the problem substantially. An introduction to the epistemological perspective on steganography is given along with a structured discussion on how the novel perspective fits into the existing body of literature.left-ventricle 发表于 2025-3-28 07:48:26
http://reply.papertrans.cn/47/4651/465068/465068_39.png确认 发表于 2025-3-28 13:51:18
0302-9743organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.978-3-642-04430-4978-3-642-04431-1Series ISSN 0302-9743 Series E-ISSN 1611-3349