找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Hiding; 11th International W Stefan Katzenbeisser,Ahmad-Reza Sadeghi Conference proceedings 2009 Springer-Verlag Berlin Heidelb

[复制链接]
楼主: hearken
发表于 2025-3-25 07:08:17 | 显示全部楼层
发表于 2025-3-25 10:45:38 | 显示全部楼层
发表于 2025-3-25 12:42:40 | 显示全部楼层
发表于 2025-3-25 18:46:02 | 显示全部楼层
发表于 2025-3-25 23:06:39 | 显示全部楼层
Thomas Gloe,Karsten Borowka,Antje Winklerontent and design as well as at the level of corpus exploitation by learners and teachers’ (Braun, 2005: 55). Some empirical studies have been conducted to implement the idea of corpus pedagogic processing. An early example is Braun’s (2005) multimedia learning platform of ELISA, which consists of a
发表于 2025-3-26 03:10:05 | 显示全部楼层
Estimating Steganographic Fisher Information in Real Imagesized and -shaped pixel groups, and the results of DC normalization within pixel groups. This work suggests lessons for the future design of spatial-domain steganalysis, and also the optimization of embedding functions.
发表于 2025-3-26 04:23:28 | 显示全部楼层
Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterizationethod outperforms conventional self-recovery fragile watermarking algorithms in tamper detection and tamper recovery under various attacks. Additionally, the proposed scheme is not vulnerable to the collage attack, constant-average attack and four-scanning attack.
发表于 2025-3-26 09:54:35 | 显示全部楼层
Microphone Classification Using Fourier Coefficientsn, show a high accuracy of up to 93.5% correct classifications for the case of 2048 frequency coefficients in a test set of seven microphones classified with linear logistic regression models. This positive tendency motivates further experiments with larger test sets and further studies for microphone identification.
发表于 2025-3-26 15:56:55 | 显示全部楼层
Fisher Information Determines Capacity of ,-Secure Steganographyems and optimizing their performance. In particular, using an analytic cover model fit to experimental data obtained from a large number of natural images, we prove that the ±1 embedding operation is asymptotically optimal among all mutually independent embedding operations that modify cover elements by at most 1.
发表于 2025-3-26 17:48:06 | 显示全部楼层
Forensic Tracking Watermarking against In-theater Piracysuspected position of the camcorder in the theater and to extract the embedded forensic marking data which specifies theater information and time stamp. Therefore, our watermarking system provides conclusive evidence to take the pirate to the court. Experimental results demonstrate robustness of the LACF and accuracy of the proposed modeling.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-24 18:55
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表