找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Digital Forensics and Watermarking; 16th International W Christian Kraetzer,Yun-Qing Shi,Hyoung Joong Kim Conference proceedings 2017 Sprin

[复制链接]
楼主: ODE
发表于 2025-3-23 13:00:49 | 显示全部楼层
Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Codingedding costs are assigned to the audio samples. Finally, the STC is used to create the stego audio. The extensive results evaluated on 10,000 music and 10,000 speech audio clips have shown that our method can significantly outperform the conventional . LSB based steganography in terms of security and audio quality.
发表于 2025-3-23 15:38:58 | 显示全部楼层
发表于 2025-3-23 20:57:49 | 显示全部楼层
发表于 2025-3-24 01:11:32 | 显示全部楼层
发表于 2025-3-24 05:07:46 | 显示全部楼层
发表于 2025-3-24 09:29:22 | 显示全部楼层
发表于 2025-3-24 13:45:16 | 显示全部楼层
Information Hiding Using CAVLC: Misconceptions and a Detection Strategyles for adjacent blocks and result in decoding errors. (2) CAVLC codewords can be indiscriminately substituted. Actually, it will cause serious distortion drifts. In addition, considering steganographic security, a detection strategy is proposed based on statistical analysis of some CAVLC-based methods.
发表于 2025-3-24 17:58:16 | 显示全部楼层
A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rs (STCs) and interleaved sub-lattices are leveraged to minimize the overall embedding distortion. Comparative experimental results have demonstrated that, with similar embedding rates, the proposed method has much lower impacts on coding efficiency (both on the visual quality and compression efficiency) compared to other schemes.
发表于 2025-3-24 21:55:46 | 显示全部楼层
Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitutionn function is designed to achieve optimal masking effect via the psychoacoustic model (PAM). Experimental results show that our method achieves better performance than others in terms of security and secure payload, the detection accuracy of the proposed method is lower than . under 128 kbps when the relative payload is equal to 0.25.
发表于 2025-3-25 03:08:50 | 显示全部楼层
Conference proceedings 2017nti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of informationhiding : usage  scenarios and detection approaches..
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-4-29 14:08
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表