踉跄 发表于 2025-3-23 18:56:32

http://reply.papertrans.cn/47/4660/465904/465904_13.png

废除 发表于 2025-3-23 22:27:25

http://reply.papertrans.cn/47/4660/465904/465904_14.png

束缚 发表于 2025-3-24 05:30:27

http://reply.papertrans.cn/47/4660/465904/465904_15.png

Commonwealth 发表于 2025-3-24 09:22:08

A Semi-fragile Steganographic Digital Signature for Images,. This paper presents a new semi-fragile steganographic technique for embedding digital signatures in images. This is achieved by using a novel modified Bit-Plane Complexity Segmentation (BPCS) Based Steganography scheme. Semi-fragile implies survival from limited processing, which is achieved by ut

擦掉 发表于 2025-3-24 12:51:57

Identification of Traitors Using a Trellis, dishonest users, called traitors, collude to create a pirate copy that hides their identities, by putting together different parts of their copies. If the sets to be embedded are the codewords of an error correcting code then efficient algorithms can be used to trace the traitors. In this paper we

权宜之计 发表于 2025-3-24 18:02:14

http://reply.papertrans.cn/47/4660/465904/465904_18.png

Cryptic 发表于 2025-3-24 19:16:20

Reflector Attack Traceback System with Pushback Based iTrace Mechanism,ques, since the marked information written by any routers between the attacker and the reflectors will be lost in the replied packets from the reflectors. In response to such attacks, advanced IP traceback technology must be suggested. This study proposed an improved . technique that identifies DDoS

DAMP 发表于 2025-3-25 01:10:34

http://reply.papertrans.cn/47/4660/465904/465904_20.png

semble 发表于 2025-3-25 04:53:58

http://reply.papertrans.cn/47/4660/465904/465904_21.png

失望昨天 发表于 2025-3-25 10:20:19

http://reply.papertrans.cn/47/4660/465904/465904_22.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Information and Communications Security; 6th International Co Javier Lopez,Sihan Qing,Eiji Okamoto Conference proceedings 2004 Springer-Ver