Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference37 articles.
1. Abdulla AA (2015) "Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography," University of Buckingham
2. Agarwal R, Verma OP (2019) An efficient copy move forgery detection using deep learning feature extraction and matching algorithm. Multimedia Tools Applications:1–22
3. AlShehri L, Hussain M, Aboalsamh H, Wadood A (2020) Fragile watermarking for image authentication using BRINT and ELM. Multimedia Tools and Applications 79:29199–29223
4. Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. International Journal of Machine Learning and Cybernetics 7:1225–1239
5. Bas P, Furon T (2007) "BOWS-2, http://bows2.eclille.fr/index.php?mode=VIEW&tmpl=index1.," .
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献