欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
会议
> 会议详情页
Efficient designated confirmer signature from bilinear pairings
所属机构名称:中山大学
会议名称:Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS
成果类型:会议
相关项目:数字媒体内容安全关键技术及评测方法的研究
作者:
Xiaofeng Che|Fangguo Zhang| Baodian Wei|
同会议论文项目
数字媒体内容安全关键技术及评测方法的研究
期刊论文 81
会议论文 45
获奖 3
专利 42
著作 1
同项目会议论文
On Constrained Sparse Matrix Factorizatio
Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images Using Coefficient Symmetry.
Attack lsb matching steganography by counting alteration rate of the number of neighbourhood gray le
Binary image authentication using Zernike moments
A GA-based joint coding and embedding optimization for robust and high capacity image watermarking
Fast and Automatic Watermark Resynchronization based on Zernike Moments.
An efficient print-scanning resilient data hiding scheme based on a novel LPM
Semi-supervised Discriminant Analysis Based on UDP Regularization
Strengthening QIM-based watermarking by non-uniform discrete cosine transform
Generic Security Amplifying Methods of Ordinary Digital Signatures
Watermarking Security Incorporating Natural Scene Statistics
A convolutive mixing model for shifted double jpeg compression. with application to passive image au
Face Illumination Normalization on Large and Small Scale Features
A study on security performance of YASS
A Conscience On-line Learning Approach for Kernel-Based Clustering
Spread Spectrum Watermarking to Achieve a Trade-off Between Security and Robustness.
A geometrically resilient robust image watermarking scheme using deformable multi-scale transform
Textural features based universal steganalysis
Secure Spread-spectrum Watermarking Schemes in the Known Message Attack.
Security Analysis of ISS Watermarking Using Natural Scene Statistics.
People Consistent Labeling Between Uncalibrated CAMERAS Without Planar Ground Assumption
Face Hallucination under an Image Decomposition Perspective
A Fast Extension for Sparse Representation on Robust Face Recognition
A Highly Adaptable Capacity and Invisibility 3D Watermarking Based on Four-Points Sets
Image Splicing Detection Based on Estimation of Camera Intrinsic Parameters
Restoration of a Frontal Illuminated Face Image Based on KPCA
Efficient Action Detection: A Coarse-to-Fine Strategy
Universal JPEG steganalysis based on microscopic and macroscopic calibration
A novel method for detecting cropped and recompressed image block.
Effect of Coding Pattern on Compression Domain Based Universal JPEG Steganalysis.
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analy
Audio watermarking robust to geometrical distortions based on dyadic wavelet transform.
Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain.
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
Robust and high capacity image watermarking based on jointly coding and embedding optimization.
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Droppi
Entropy codec based on evolutionary MHT and its application in video encryption
Defeating Fake-Quality MP3.
Robust AVS Audio Watermarking.
Blind Mesh Watermarking Based On the Featured Points In the Frequency Domain
Detect Digital Image Splicing with Visual Cues.
MPEG recompression detection based on block artifacts.
Detecting digital audio forgeries by checking frame offsets
Reversible watermarking with subliminal channel