张雄伟, 葛晓义, 孙蒙, 李莉 - … & Processing/Shu Ju Cai Ji …, 2023 - search.ebscohost.com
… ,one of the key techniques for ensuring network information security … Audio steganography by modification of cepstrum at a pair of … Codeword replacementbased on shortest Euclidean …
… the following aspects:1)the development and security of deep forgery detection technol⁃ ogy,… :face replacement,lip syn⁃ chronization,head puppets,and attribute modification. The most …