间接 发表于 2025-3-28 18:34:19

http://reply.papertrans.cn/47/4651/465070/465070_41.png

impaction 发表于 2025-3-28 19:11:02

http://reply.papertrans.cn/47/4651/465070/465070_42.png

恫吓 发表于 2025-3-28 23:24:35

Information Leakage in Optimal Anonymized and Diversified Datafor example by dropping the last digit of the postal code, so that the published dataset meets certain privacy requirements, like the notions of .-anonymity and ℓ-diversity. On the other hand, the published dataset should remain useful and not over generalized. Hence it is desire to disseminate a da

欢乐东方 发表于 2025-3-29 03:38:06

http://reply.papertrans.cn/47/4651/465070/465070_44.png

Mere仅仅 发表于 2025-3-29 09:18:47

Detecting Re-projected Videohigh quality, it is usually easy to visually detect such recordings. However, given the wide variety of video content and film-making styles, automatic detection is less straight-forward. We describe an automatic technique for detecting a video that was recorded from a screen. We show that the inter

HAUNT 发表于 2025-3-29 13:22:40

Residual Information of Redacted Images Hidden in the Compression Artifactsensitive region with black or white values. Our goal is to study the effectiveness of this simple method in purging information. Since digital images are usually lossily compressed via quantization in the frequency domain, each pixel in the spatial domain will be “spread” to its surroundings, simila

冷峻 发表于 2025-3-29 18:26:58

http://reply.papertrans.cn/47/4651/465070/465070_47.png

Libido 发表于 2025-3-29 20:01:39

http://reply.papertrans.cn/47/4651/465070/465070_48.png

大都市 发表于 2025-3-30 03:13:10

http://reply.papertrans.cn/47/4651/465070/465070_49.png

禁令 发表于 2025-3-30 05:44:04

Block-Chain Based Fragile Watermarking Scheme with Superior Localizationship between the security strength and block size is also discussed. In the proposed scheme, all blocks in the original image randomly form a linear chain based on the secret key in such a manner that the watermark of an image block is hidden in the next block in the block-chain. In the tamper detec
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Hiding; 10th International W Kaushal Solanki,Kenneth Sullivan,Upamanyu Madhow Conference proceedings 2008 Springer-Verlag Berli