[HTML][HTML] 植基於可回復資訊隱藏上向量量化編碼數位影像之研究

CT Huang - 2013 - ir.lib.ncu.edu.tw
… Second, this dissertation presents two steganographic methods, the two-level embedding …
to the area of VQ-based steganographic methods in terms of applicable measures such as the …

基于像素差和索引函数的信息隐藏算法

申淑媛, 黄立宏, 余松森 - Computer Science and Application, 2017 - hanspub.org
: 在2× 2 像素块中, 参考像素值由索引函数随机确定, 然后计算参考像素与其周围的其它三个像素
值的差, 根据像素差所处的划分范围决定嵌入像素的秘密信息比特数. 利用余函数嵌入秘密信息…

[PDF][PDF] 利用影像內插與失真評估之資料隱藏演算法

林宗瀚, 王宗銘 - 興大工程學刊, 2010 - core.ac.uk
… Inspired from the image interpolation proposed by Jung et al., we use hybrid OPAP and
LSB-matching to … Furthermore, the proposed method can withstand the RS steganalysis attack. …

[PDF][PDF] 資訊工程學門---研究發展及推動小組

曾煜棋 - 2009 - ir.lib.nycu.edu.tw
… Fuzzy query translation for relational database systems … A new interpolative reasoning
method in sparse rule-based … A steganographic method for digital images using side match

[PDF][PDF] 資訊工程學門一研究發展及推動小組

曾煜棋 - 2011 - ir.lib.nycu.edu.tw
… Fuzzy query translation for relational database systems … A new interpolative reasoning
method in sparse rule-based … A steganographic method for digital images using side match

[PDF][PDF] 基于深度学习的图像隐写分析综述

陈君夫, 付章杰, 张卫明, 程旭, 孙星明 - 软件学报, 2020 - jos.org.cn
… of steganalysis technology based on … of steganalysis. Firstly, this study analyzes and
compares the differences between traditional steganalysis and deep learning-based steganalysis. …

[HTML][HTML] 多媒体隐写研究进展

张卫明, 王宏霞, 李斌, 任延珍, 杨忠良, 陈可江… - 2022 - cjig.cn
… ideas and key technologies of steganography, and then introduce the progress of steganography
for the most important … As for image steganography, this paper reviews model-based

影像隱藏, 驗證與修復之研究

張御傑, 林志青 - 2008 - ir.lib.nycu.edu.tw
… in many existing steganography methods reported recently. … solution of the simple LSB
substitution method; however, due … for optimal substitution for the simple LSB substitution method…

隐蔽信道新型分类方法与威胁限制策略

王翀, 王秀利, 吕荫润, 张常有, 吴敬征, 关贝, 王永吉 - 软件学报, 2019 - jos.org.cn
… are widely existed in information systems. More recently, the focus has shifted towards
three new kinds of covert channels, namely, covert hybrid channels, covert behavior channels, …

[PDF][PDF] 深度伪造及其取证技术综述

丁峰, 匡仁盛, 周越, 孙珑, 朱小刚, 朱国普 - 中国图象图形学报, 2024 - cjig.cn
… divided into four categories:face replacement,lip syn⁃ chronization,head puppets,and
attribute modification. The most commonly used Deepfake algorithms are based on selfencoders,…