找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Digital Forensics and Watermarking; 17th International W Chang D. Yoo,Yun-Qing Shi,Gwangsu Kim Conference proceedings 2019 Springer Nature

[复制链接]
查看: 53335|回复: 51
发表于 2025-3-21 16:57:05 | 显示全部楼层 |阅读模式
书目名称Digital Forensics and Watermarking
副标题17th International W
编辑Chang D. Yoo,Yun-Qing Shi,Gwangsu Kim
视频video
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Digital Forensics and Watermarking; 17th International W Chang D. Yoo,Yun-Qing Shi,Gwangsu Kim Conference proceedings 2019 Springer Nature
描述This book constitutes the refereed proceedings of the 17th International Workshop .on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018..The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection. .
出版日期Conference proceedings 2019
关键词cryptography; digital forensics; watermarking; steganalysis; steganography; security service; data hiding;
版次1
doihttps://doi.org/10.1007/978-3-030-11389-6
isbn_softcover978-3-030-11388-9
isbn_ebook978-3-030-11389-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer Nature Switzerland AG 2019
The information of publication is updating

书目名称Digital Forensics and Watermarking影响因子(影响力)




书目名称Digital Forensics and Watermarking影响因子(影响力)学科排名




书目名称Digital Forensics and Watermarking网络公开度




书目名称Digital Forensics and Watermarking网络公开度学科排名




书目名称Digital Forensics and Watermarking被引频次




书目名称Digital Forensics and Watermarking被引频次学科排名




书目名称Digital Forensics and Watermarking年度引用




书目名称Digital Forensics and Watermarking年度引用学科排名




书目名称Digital Forensics and Watermarking读者反馈




书目名称Digital Forensics and Watermarking读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:50:45 | 显示全部楼层
发表于 2025-3-22 01:48:49 | 显示全部楼层
Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis filter and DCT filter are both used for residual extraction. However, there are few comparisons in existing convolutional neural networks (CNNs) based JPEG steganalysis using Gabor filter or DCT filter in the pre-processing stage to extract residuals. In this paper, we compare the performance of DC
发表于 2025-3-22 06:36:56 | 显示全部楼层
A Deep Residual Multi-scale Convolutional Network for Spatial Steganalysis performances on discriminating trivial perturbation introduced by spatial steganographic schemes. In this paper, we propose a deep residual multi-scale convolutional network model, which outperforms several CNN-based steganalysis schemes and hand-crafted rich models. Compared to CNN-based steganaly
发表于 2025-3-22 09:41:00 | 显示全部楼层
Provably Secure Generative Steganography Based on Autoregressive ModelConsequently, generative steganography, a novel steganographic method finishing the operation of steganography directly in the process of image generation, tends to get more attention. However, most of the existing generative steganographic methods have more or less shortcomings, such as low securit
发表于 2025-3-22 15:47:57 | 显示全部楼层
A Novel Steganalysis of Steghide Focused on High-Frequency Region of Audio Waveformonventional steganalysis utilize the statistics of high-frequency regions and silent temporal segments of the target signals intentionally or unintentionally. Moreover, the frequency components just below the Nyquist frequency are important for statistic-based steganalysis in terms of the signal-to-
发表于 2025-3-22 18:17:07 | 显示全部楼层
Cycle GAN-Based Attack on Recaptured Images to Fool both Human and Machineed to detect recaptured images. To counter these techniques, in this paper, we propose a method that can translate recaptured images to fake “original images” to fool both human and machines. Our method is proposed based on Cycle-GAN which is a classic framework for image translation. To obtain bett
发表于 2025-3-22 23:12:13 | 显示全部楼层
Spherical Panorama Image Watermarking Using Viewpoint Detectionnt a new watermarking technique to protect spherical panorama images as well as view-images that are rendered with a specific viewpoint. Solving the watermark synchronization problem in the detection process requires finding the viewpoint of a view-image. Scale Invariant Feature Transform (SIFT) and
发表于 2025-3-23 04:57:28 | 显示全部楼层
发表于 2025-3-23 07:12:30 | 显示全部楼层
Improved High Capacity Spread Spectrum-Based Audio Watermarking by Hadamard Matriceson. In this paper, we use Hadamard sequences, which are rows of Hadamard matrices, to embed and extract watermarks instead of pseudonoise sequences. By exploiting the orthogonality of Hadamard sequences and a technique of sign change, we propose a new spread spectrum-based audio watermarking method.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-18 22:38
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表