找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit

[复制链接]
楼主: 监督
发表于 2025-3-28 18:38:55 | 显示全部楼层
https://doi.org/10.1007/978-3-663-07997-2logy to protect copyright information, and proposes a scheme utilizes the support vector machine (SVM) based on posterior probability and the optimized genetic algorithm (GA). Firstly, each training image is divided into sub-blocks of 8 * 8 pixels, and they are trained and classified by the SVM to o
发表于 2025-3-28 20:11:16 | 显示全部楼层
The Research of Cryptosystem Recognition Based on Randomness Test’s Return Valuecryptosystem recognition applications. And we also conduct further analysis: (a) analyze some features’ recognition performance, and find the relation of some feature’s recognition accuracies and cryptosystem. (b) compared with existed features, part of new features maintain high recognition accurac
发表于 2025-3-28 23:26:12 | 显示全部楼层
VideoChain: Trusted Video Surveillance Based on Blockchain for Campusion scenario. The analysis shows that VideoChain is traceable and non-tampering, which can effectively ensure the credibility of video surveillance data. It also has good operational efficiency. This research is of great significance to enhance the trust between the government and citizens, which wi
发表于 2025-3-29 04:02:06 | 显示全部楼层
A Blind Quantization Watermarking Scheme for Screen Content Imager a wide variety of image contents, including texts, graphics, symbols, patterns, and natural images. Experiments show that our method has a good performance in term of robustness and better visual quality.
发表于 2025-3-29 07:26:08 | 显示全部楼层
发表于 2025-3-29 12:28:51 | 显示全部楼层
发表于 2025-3-29 17:40:29 | 显示全部楼层
A Multiple Watermarking Scheme for Content Authentication of OOXML Format Documents synonym substitutions has a strong robustness against the attacks on formats and the content. However, the double fragile watermarking methods can sensitively perceive tampers in the content and formats of the watermarked document, and predict the type of tampers with capability of locating the tam
发表于 2025-3-29 22:30:59 | 显示全部楼层
发表于 2025-3-30 02:46:32 | 显示全部楼层
发表于 2025-3-30 07:03:54 | 显示全部楼层
A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GAmpared with the experimental results of other algorithms, the proposed scheme has better resistance against some common attacks, such as Histogram Equalization, Guassian Noise (0.04), Guassian Noise (0.05), JPEG (QF = 50), Salt-pepper Noise (0.01).
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-4 00:13
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表