×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [5]
大连理工大学 [1]
湖南大学 [1]
内容类型
期刊论文 [4]
会议论文 [3]
发表日期
2021 [2]
2020 [1]
2016 [2]
2013 [1]
2011 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共7条,第1-7条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 卷号: 80, 期号: 9, 页码: -
作者:
Zhang, Qiuyu
;
Han, Jitian
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/03/12
Bioinformatics
Chaotic systems
Color
Cryptography
DNA
DNA sequences
Image analysis
Image enhancement
Arithmetic operations
Color image encryptions
Control parameters
Differential characteristic
Hyper-chaotic systems
Image sensitivity
Location analysis
Strong robustness
An encrypted speech authentication and tampering recovery method based on perceptual hashing
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 卷号: 80, 期号: 16, 页码: 24925-24948
作者:
Zhang, Qiu-yu
;
Zhang, Deng-hai
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2021/06/03
Encrypted speech authentication
Perceptual hashing
Least square curve fitting
Tampering location
Tampering recovery
An encrypted speech authentication method based on uniform subband spectrum variance and perceptual hashing
期刊论文
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 卷号: 28, 期号: 5, 页码: 2467-2482
作者:
Zhang, Qiuyu
;
Zhang, Denghai
;
Zhou, Liang
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/03/01
Encrypted speech authentication
perceptual hashing
uniform subband spectrum variance
feature extraction of encrypted speech
tamper location
An image copy move forgery detection method using QDCT
会议论文
Xi'an, China, August 19, 2016 - August 21, 2016
作者:
Li, Ce
;
Ma, Qiang
;
Xiao, Limei
;
Ying, Shihui
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Computer crime
Discrete cosine transforms
Copy-move forgeries
Copy-move forgery detections
Digital image forensics
Duplication detection
Feature vectors
QDCT
Tampered images
Threshold-value
An Image Copy Move Forgery Detection Method Using QDCT
会议论文
作者:
Li, Ce
;
Ma, Qiang
;
Xiao, Limei
;
Ying, Shihui
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/11/15
Digital image forensics
QDCT
copy-move forgery
region duplication detection
Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression
会议论文
Conference on Media Watermarking, Security, and Forensics, Burlingame, CA, 2013-02-05
作者:
Wu, Lanying
;
Kong, Xiangwei
;
Wang, Bo
;
Shang, Shize
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
image forensics
image tampering location
JPEG artifacts
non-aligned double JPEG compression
A complete passive blind image copy-move forensics scheme based on compound statistics features.
期刊论文
Forensic science international, 2011, 卷号: Vol.212 No.1-3, 页码: e21-e25
作者:
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2020/01/05
Digital image forensics
Sensor pattern noise
Wavelet transform based de-noise
Tampering location
©版权所有 ©2017 CSpace - Powered by
CSpace