Found: 27
Select item for more details and to access through your institution.
Anti-forensics of diffusion-based image inpainting.
- Published in:
- Journal of Electronic Imaging, 2020, v. 29, n. 4, p. 43026, doi. 10.1117/1.JEI.29.4.043026
- By:
- Publication type:
- Article
Steganography in stylized images.
- Published in:
- Journal of Electronic Imaging, 2019, v. 28, n. 3, p. 33005, doi. 10.1117/1.JEI.28.3.033005
- By:
- Publication type:
- Article
Steganography in animated emoji using self-reference.
- Published in:
- Multimedia Systems, 2021, v. 27, n. 3, p. 331, doi. 10.1007/s00530-020-00723-z
- By:
- Publication type:
- Article
Image Inpainting Anti-Forensics Network via Attention-Guided Hierarchical Reconstruction.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 2, p. 393, doi. 10.3390/sym15020393
- By:
- Publication type:
- Article
Perceptual Hash of Neural Networks.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 4, p. N.PAG, doi. 10.3390/sym14040810
- By:
- Publication type:
- Article
Breaking Steganography: Slight Modification with Distortion Minimization.
- Published in:
- International Journal of Digital Crime & Forensics, 2019, v. 11, n. 1, p. 114, doi. 10.4018/IJDCF.2019010109
- By:
- Publication type:
- Article
Reversible Data Hiding in Encrypted Images Based on Image Interpolation.
- Published in:
- International Journal of Digital Crime & Forensics, 2014, v. 6, n. 3, p. 16, doi. 10.4018/ijdcf.2014070102
- By:
- Publication type:
- Article
Robust digital watermarking for color images in combined DFT and DT-CWT domains.
- Published in:
- Mathematical Biosciences & Engineering, 2019, v. 16, n. 5, p. 4788, doi. 10.3934/mbe.2019241
- By:
- Publication type:
- Article
Constructive Steganography by Tangles.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 8, p. 3911, doi. 10.3837/tiis.2018.08.020
- By:
- Publication type:
- Article
Reversible Data Hiding in JPEG Images Using Ordered Embedding.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 2, p. 945, doi. 10.3837/tiis.2017.02.017
- By:
- Publication type:
- Article
Reversible Privacy Protection with the Capability of Antiforensics.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5558873
- By:
- Publication type:
- Article
Defeating data hiding in social networks using generative adversarial network.
- Published in:
- EURASIP Journal on Image & Video Processing, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13640-020-00518-2
- By:
- Publication type:
- Article
Semi-structured data protection scheme based on robust watermarking.
- Published in:
- EURASIP Journal on Image & Video Processing, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13640-020-00500-y
- By:
- Publication type:
- Article
An SVD-based screen-shooting resilient watermarking scheme.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 23, p. 32841, doi. 10.1007/s11042-022-12738-x
- By:
- Publication type:
- Article
An SVD-based screen-shooting resilient watermarking scheme.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 22, p. 32841, doi. 10.1007/s11042-022-12738-x
- By:
- Publication type:
- Article
Block cipher based separable reversible data hiding in encrypted images.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13749, doi. 10.1007/s11042-015-2760-9
- By:
- Publication type:
- Article
Evolutionary selection extreme learning machine optimization for regression.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2012, v. 16, n. 9, p. 1485, doi. 10.1007/s00500-012-0823-7
- By:
- Publication type:
- Article
Multimedia Security: Novel Steganography and Privacy Preserving.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6390945
- By:
- Publication type:
- Article
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1879, doi. 10.1093/comjnl/bxad109
- By:
- Publication type:
- Article
Sparse Backdoor Attack Against Neural Networks.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1783, doi. 10.1093/comjnl/bxad100
- By:
- Publication type:
- Article
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention.
- Published in:
- Computer Journal, 2024, v. 67, n. 2, p. 498, doi. 10.1093/comjnl/bxac190
- By:
- Publication type:
- Article
A New Steganography Method for Dynamic GIF Images Based on Palette Sort.
- Published in:
- Wireless Communications & Mobile Computing, 2020, p. 1, doi. 10.1155/2020/8812087
- By:
- Publication type:
- Article
Spectrum-estimation based lossless information recovery for sparse array patterns.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 163, doi. 10.1007/s11235-010-9365-4
- By:
- Publication type:
- Article
Distortion Function for Emoji Image Steganography.
- Published in:
- Computers, Materials & Continua, 2019, v. 59, n. 3, p. 943, doi. 10.32604/cmc.2019.05768
- By:
- Publication type:
- Article
Robust Image Hashing via Random Gabor Filtering and DWT.
- Published in:
- Computers, Materials & Continua, 2018, v. 55, n. 2, p. 331, doi. 10.3970/cmc.2018.02222
- By:
- Publication type:
- Article
Domain Transferred Image Recognition via Generative Adversarial Network.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4466426
- By:
- Publication type:
- Article
Self-embedding watermark with flexible restoration quality.
- Published in:
- Multimedia Tools & Applications, 2011, v. 54, n. 2, p. 385, doi. 10.1007/s11042-010-0541-z
- By:
- Publication type:
- Article