Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 173
1.
  • Efficient Reversible Data H... Efficient Reversible Data Hiding Simultaneously Exploiting Adjacent Pixels
    Wu, Hanzhou IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    As an effective means to content authentication and privacy protection, reversible data hiding (RDH) permits us to hide a payload such as authentication data in a media file. The resulting marked ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
2.
  • METEOR: Measurable Energy M... METEOR: Measurable Energy Map Toward the Estimation of Resampling Rate via a Convolutional Neural Network
    Ding, Feng; Wu, Hanzhou; Zhu, Guopu ... IEEE transactions on circuits and systems for video technology, 12/2020, Volume: 30, Issue: 12
    Journal Article
    Peer reviewed

    In recent years, with the improvements in machine learning, image forensics has made considerable progress in detecting editing manipulations. This progress also raises more questions in image ...
Full text
Available for: IJS, NUK, UL
3.
  • Protecting the Intellectual... Protecting the Intellectual Property of Speaker Recognition Model by Black-Box Watermarking in the Frequency Domain
    Wang, Yumin; Wu, Hanzhou Symmetry (Basel), 03/2022, Volume: 14, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Benefiting from the rapid development of computer hardware and big data, deep neural networks (DNNs) have been widely applied in commercial speaker recognition systems, achieving a kind of symmetry ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
4.
  • Multi-party watermark embed... Multi-party watermark embedding with frequency-hopping sequences
    Zhou, Limengnan; Wu, Hanzhou Cryptography and communications, 03/2022, Volume: 14, Issue: 2
    Journal Article
    Peer reviewed

    Embedding multiple watermarks into a digital object enables multiple purposes to be realized. In this paper, we present a multi-party watermark embedding framework based on frequency-hopping ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
5.
  • A passive forensic scheme f... A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering
    Liu, Yong; Wang, Hongxia; Chen, Yi ... Multimedia tools and applications, 2020/1, Volume: 79, Issue: 1-2
    Journal Article
    Peer reviewed

    Copy-move forgery is a commonly used operation for digital image. Most of the existing copy-move schemes designed to region duplication are block-based and keypoint-based. In general, block-based ...
Full text
Available for: CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
6.
  • Steganographic visual story... Steganographic visual story with mutual-perceived joint attention
    Guo, Yanyang; Wu, Hanzhou; Zhang, Xinpeng EURASIP journal on image and video processing, 01/2021, Volume: 2021, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Social media plays an increasingly important role in providing information and social support to users. Due to the easy dissemination of content, as well as difficulty to track on the social network, ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
7.
  • High-Frequency Artifacts-Re... High-Frequency Artifacts-Resistant Image Watermarking Applicable to Image Processing Models
    Zhang, Li; Zhang, Xinpeng; Wu, Hanzhou Applied sciences, 02/2024, Volume: 14, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    With the extensive adoption of generative models across various domains, the protection of copyright for these models has become increasingly vital. Some researchers suggest embedding watermarks in ...
Full text
Available for: NUK, UL, UM, UPUK
8.
  • Generalized Reversible Data... Generalized Reversible Data Hiding with Content-Adaptive Operation and Fast Histogram Shifting Optimization
    Zhou, Limengnan; Han, Hongyu; Wu, Hanzhou Entropy (Basel, Switzerland), 07/2021, Volume: 23, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Reversible data hiding (RDH) has become a hot spot in recent years as it allows both the secret data and the raw host to be perfectly reconstructed, which is quite desirable in sensitive applications ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
9.
  • Exploiting Frequency Charac... Exploiting Frequency Characteristics for Boosting the Invisibility of Adversarial Attacks
    Li, Chen; Liu, Yong; Zhang, Xinpeng ... Applied sciences, 04/2024, Volume: 14, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    Mainstream transferable adversarial attacks tend to introduce noticeable artifacts into the generated adversarial examples, which will impair the invisibility of adversarial perturbation and make ...
Full text
Available for: NUK, UL, UM, UPUK
10.
  • Ultrasensitive flexible mag... Ultrasensitive flexible magnetoelectric sensor
    Yang, Nana; Wu, Hanzhou; Wang, Shidong ... APL materials, 02/2021, Volume: 9, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Ever-evolving advances in flexible magnetic sensors are promising to fuel technological developments in the fields of touchless human–machine interaction, implantable medical diagnosis, and ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
1 2 3 4 5
hits: 173

Load filters