|
|
|
Zhijun Wu, Rong Li, Panpan Yin and Changliang Li
Steganalysis is used for preventing the illegal use of steganography to ensure the security of network communication through detecting whether or not secret information is hidden in the carrier. This paper presents an approach to detect the quantization ...
ver más
|
|
|
|
|
|
|
Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni and Hocine Cherifi
Three-dimensional models have been extensively used in several applications including computer-aided design (CAD), video games, medical imaging due to the processing capability improvement of computers, and the development of network bandwidth. Therefore...
ver más
|
|
|
|
|
|
|
Hwai-Tsu Hu, Ying-Hsiang Lu
Pág. 18 - 32
This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partition...
ver más
|
|
|
|
|
|
|
Hwai-Tsu Hu, Ying-Hsiang Lu
This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partition...
ver más
|
|
|
|