欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
会议
> 会议详情页
An efficient print-scanning resilient data hiding scheme based on a novel LPM
所属机构名称:中山大学
成果类型:会议
相关项目:信息隐藏的安全性和稳健性研究
同会议论文项目
信息隐藏的安全性和稳健性研究
期刊论文 36
会议论文 30
获奖 4
著作 1
同项目会议论文
A convolutive mixing model for shifted double jpeg compression with application to passive image aut
A GA-based joint coding and embedding optimization for robust and high capacity image watermarking.
A novel method for detecting cropped and recompressed image block.
Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain.
Robust and high capacity image watermarking based on jointly coding and embedding optimization
Robust Audio Watermarking Based on Zernike Moments. 226-240.
Binary image authentication using Zernike moments.
Reversible Semi-fragile Image Authentication using Zernike Moments and Integer Wavelet Transform.
Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition
Steganalysis of Multiple-Base Notational System Steganography
Audio Watermarking Robust to Time-Scale Modification and MP3 Compression
Audio watermarking robust to geometrical distortions based on dyadic wavelet transform.
A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream.
Steganalysis of YASS
Robust Detection of Region-Duplication Forgery in Digital Image
A study on security performance of YASS
Universal jpeg steganalysis based on microscopic and macroscopic calibration
A Hybrid Watermarking Scheme for Video Authentication.
Detecting?Digital?Audio?Forgeries?by?Checking?Frame?Offsets
Steganalysis of JPEG2000 Lazy-Mode Steganography Using the Hilbert-Huang Transform Based Sequential
Robust Audio Watermarking Based on Log-polar Frequency Index
Effect of Coding Pattern on Compression Domain Based Universal JPEG Steganalysis
A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform
A Watermarking Algorithm for JPEG File.
MPEG recompression detection based on block artifacts.
Textural features based universal steganalysis
Watermarking Security Incorporating Natural Scene Statistics
Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images Using Coefficient Symmetry.
Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray le