两边在扩散 发表于 2025-3-21 20:06:40
书目名称Information Hiding影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0465070<br><br> <br><br>书目名称Information Hiding影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0465070<br><br> <br><br>书目名称Information Hiding网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0465070<br><br> <br><br>书目名称Information Hiding网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0465070<br><br> <br><br>书目名称Information Hiding被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0465070<br><br> <br><br>书目名称Information Hiding被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0465070<br><br> <br><br>书目名称Information Hiding年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0465070<br><br> <br><br>书目名称Information Hiding年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0465070<br><br> <br><br>书目名称Information Hiding读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0465070<br><br> <br><br>书目名称Information Hiding读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0465070<br><br> <br><br>cruise 发表于 2025-3-21 21:50:02
Detecting Re-projected Videoc detection is less straight-forward. We describe an automatic technique for detecting a video that was recorded from a screen. We show that the internal camera parameters of such video are inconsistent with the expected parameters of an authentic video.STANT 发表于 2025-3-22 01:20:54
Reversible Watermarking with Subliminal Channel suffices in the research. To exemplify the idea, the paper gives a variant of the R-S watermarking scheme. The variant adopts the broad-band subliminal channel in RSA-PSS signature scheme. The analysis and experiments show that with the aid of the channel it is easier to implement the reversibility, localize the tampering, and so forth.Orchiectomy 发表于 2025-3-22 08:27:54
http://reply.papertrans.cn/47/4651/465070/465070_4.pngrefraction 发表于 2025-3-22 10:29:21
http://reply.papertrans.cn/47/4651/465070/465070_5.png粗野 发表于 2025-3-22 15:02:57
Perturbation Hiding and the Batch Steganography Problemteganographic embedding. However, numerical computations show that the result does not hold for all distributions, and we provide some additional asymptotic results to help explore the problem more widely.Rodent 发表于 2025-3-22 19:57:20
http://reply.papertrans.cn/47/4651/465070/465070_7.png性学院 发表于 2025-3-22 21:53:29
http://reply.papertrans.cn/47/4651/465070/465070_8.png过份艳丽 发表于 2025-3-23 03:13:07
http://reply.papertrans.cn/47/4651/465070/465070_9.pngOmniscient 发表于 2025-3-23 09:37:57
A Data Mapping Method for Steganography and Its Application to Imageshm. To prevent the sample pair analysis attack, the LSB. algorithm is implemented on the selected subsets of pixels to preserve some important high-order statistics as well. The experimental results of the implementation are promising.