nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hybrid DST-SBPNRM approach for compressed video steganography
|
Patel, Rachna |
|
|
27 |
3 |
p. 417-428 |
artikel |
2 |
A novel pixel-wise authentication-based self-embedding fragile watermarking method
|
Gul, Ertugrul |
|
|
27 |
3 |
p. 531-545 |
artikel |
3 |
A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing
|
Wang, Zhangdong |
|
|
27 |
3 |
p. 403-415 |
artikel |
4 |
Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret
|
Sun, Xinhao |
|
|
27 |
3 |
p. 341-352 |
artikel |
5 |
3D color channel based adaptive contrast enhancement using compensated histogram system
|
Kumar, Abhash |
|
|
27 |
3 |
p. 563-580 |
artikel |
6 |
Deep reconstruction of 1D ISOMAP representations
|
Li, Honggui |
|
|
27 |
3 |
p. 503-518 |
artikel |
7 |
Evaluation of accurate iris center and eye corner localization method in a facial image for gaze estimation
|
Ahmed, Manir |
|
|
27 |
3 |
p. 429-448 |
artikel |
8 |
Low-complexity fake face detection based on forensic similarity
|
Pan, Zhaoguang |
|
|
27 |
3 |
p. 353-361 |
artikel |
9 |
Low-complexity JPEG steganalysis via filters optimation from symmetric property
|
Luo, Weiwei |
|
|
27 |
3 |
p. 371-377 |
artikel |
10 |
Low-complexity reversible data hiding in encrypted image via MSB hierarchical coding and LSB compression
|
Cao, Fang |
|
|
27 |
3 |
p. 317-330 |
artikel |
11 |
Optical flow and pattern noise-based copy–paste detection in digital videos
|
Singh, Raahat Devender |
|
|
27 |
3 |
p. 449-469 |
artikel |
12 |
Resampling parameter estimation via dual-filtering based convolutional neural network
|
Peng, Lin |
|
|
27 |
3 |
p. 363-370 |
artikel |
13 |
Reversible data hiding in encrypted medical DICOM image
|
Kong, Ping |
|
|
27 |
3 |
p. 303-315 |
artikel |
14 |
Robust and fast image hashing with two-dimensional PCA
|
Liang, Xiaoping |
|
|
27 |
3 |
p. 389-401 |
artikel |
15 |
SHetConv: target keypoint detection based on heterogeneous convolution neural networks
|
Yin, Xiaojie |
|
|
27 |
3 |
p. 519-529 |
artikel |
16 |
Special issue on low complexity methods for multimedia security
|
Feng, Guorui |
|
|
27 |
3 |
p. 301-302 |
artikel |
17 |
Steganalysis of convolutional neural network based on neural architecture search
|
Wang, Hongbo |
|
|
27 |
3 |
p. 379-387 |
artikel |
18 |
Steganography in animated emoji using self-reference
|
Zhu, Zhiying |
|
|
27 |
3 |
p. 331-340 |
artikel |
19 |
Study of transmission system for compressed and encrypted image
|
Benlabbes, Haouari |
|
|
27 |
3 |
p. 471-482 |
artikel |
20 |
Understanding the limits of 2D skeletons for action recognition
|
Elias, Petr |
|
|
27 |
3 |
p. 547-561 |
artikel |
21 |
Video-based driver action recognition via hybrid spatial–temporal deep learning framework
|
Hu, Yaocong |
|
|
27 |
3 |
p. 483-501 |
artikel |