PHIL 发表于 2025-3-25 06:03:53

http://reply.papertrans.cn/47/4654/465351/465351_21.png

CLOUT 发表于 2025-3-25 10:20:51

Communications in Computer and Information Sciencehttp://image.papertrans.cn/i/image/465351.jpg

microscopic 发表于 2025-3-25 14:18:17

http://reply.papertrans.cn/47/4654/465351/465351_23.png

假设 发表于 2025-3-25 18:32:19

Security Improvement on a Remote User Authentication Scheme Using Smart Cards,cently, Hsiang and Shih proposed a remote user authentication scheme as an improved scheme over Yoon-Ryu-Yoo’s, and asserted that their scheme could escape from masquerade attack, parallel session attack, etc. In this paper, we show that Hsiang and Shih’s scheme still suffers from parallel session a

暴行 发表于 2025-3-25 22:08:54

Dual-Byte-Marker Algorithm for Detecting JFIF Header,In the previous paper, single-byte-marker algorithm is proposed for header detection. In this paper, another novel header detection algorithm called dual-byte-marker is proposed. Based on the experiments done on images from hard disk, physical memory and data set from DFRWS 2006 Challenge, results s

可触知 发表于 2025-3-26 03:15:20

Hiding Data in JPEG Using in-DQT Technique, communication. When using JPEG as a cover file, normally message is hidden in the AC values of quantized DCT coefficients. However, concealment of message in quantization table is yet to be done. In this paper, a novel in-DQT technique for message hiding in JPEG’s quantization table using bytewise

意见一致 发表于 2025-3-26 05:41:43

An Analysis of Syndrome Coding,g but a syndrome coding algorithm with a coset based approach, analyzed results are showing that the examined method has more flexibility to choose coset, also providing less modification distortion caused by data hiding. Analyzed method presented by clear mathematical way. As it is mathematical equ

LIMN 发表于 2025-3-26 11:45:37

http://reply.papertrans.cn/47/4654/465351/465351_28.png

archenemy 发表于 2025-3-26 13:40:56

http://reply.papertrans.cn/47/4654/465351/465351_29.png

甜食 发表于 2025-3-26 19:33:30

http://reply.papertrans.cn/47/4654/465351/465351_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security and Assurance; 4th International Co Samir Kumar Bandyopadhyay,Wael Adi,Yang Xiao Conference proceedings 2010 Springer-