咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 2 篇 机械工程
    • 2 篇 计算机科学与技术...
    • 1 篇 软件工程
    • 1 篇 网络空间安全

主题

  • 4 篇 anti-forensics
  • 1 篇 noise level esti...
  • 1 篇 composite image
  • 1 篇 symmetric encryp...
  • 1 篇 jpeg forensics
  • 1 篇 obfuscation
  • 1 篇 contrast enhance...
  • 1 篇 generative adver...
  • 1 篇 game theory
  • 1 篇 digital forensic...
  • 1 篇 blocking artifac...
  • 1 篇 attack
  • 1 篇 histogram
  • 1 篇 face tempering a...
  • 1 篇 quantization art...
  • 1 篇 forensics

机构

  • 1 篇 department of co...
  • 1 篇 aengineering res...
  • 1 篇 school of comput...
  • 1 篇 people's public ...
  • 1 篇 guangdong key la...
  • 1 篇 department of co...
  • 1 篇 institute of inf...

作者

  • 1 篇 jingjing yu
  • 1 篇 yu lifang
  • 1 篇 tian huawei
  • 1 篇 cao gang
  • 1 篇 xiangui kang
  • 1 篇 zhao yao
  • 1 篇 hui zeng
  • 1 篇 ding ning gu daw...
  • 1 篇 siwei lyu
  • 1 篇 ni rongrong
  • 1 篇 haitao zhang

语言

  • 3 篇 英文
  • 1 篇 中文
检索条件"主题词=anti-forensics"
4 条 记 录,以下是1-10 订阅
排序:
Countering JPEG anti-forensics based on noise level estimation
收藏 引用
Science China(Information Sciences) 2018年 第3期61卷 29-42页
作者: Hui ZENG Jingjing YU Xiangui KANG Siwei LYU Guangdong Key Laboratory of Information Security School of Data and Computer ScienceSun Yat-sen University Department of Computer Science University at Albany
Quantization artifact and blocking artifact are the two types of well-known fingerprints of JPEG compression. Most JPEG forensic techniques are focused on these fingerprints. However, recent research shows that these ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Disguisable Symmetric Encryption Schemes for an anti-forensics Purpose
收藏 引用
China Communications 2010年 第6期7卷 56-63页
作者: Ding Ning Gu Dawu Liu Zhiqiang Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 P. R China
In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Attacking contrast enhancement forensics in digital images
收藏 引用
Science China(Information Sciences) 2014年 第5期57卷 170-182页
作者: CAO Gang ZHAO Yao NI RongRong TIAN HuaWei YU LiFang School of Computer Science Communication University of China Institute of Information Science Beijing Jiaotong University People's Public Security University of China
Currently,plenty of digital image forensic techniques have been proposed and used as diagnostic *** is urgent and significant to assess the reliability of such techniques applied in practical *** this paper,we investi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Survey of anti-forensic for Face Image Forgery
收藏 引用
Journal of Information Hiding and Privacy Protection 2022年 第1期4卷 41-51页
作者: Haitao Zhang aEngineering Research Center of Digital forensics of Ministry of Education School of ComputerNanjing University of Information Science&TechnologyNanjing210044China
Deep learning related technologies,especially generative adversarial network,are widely used in the fields of face image tampering and *** researchers have proposed a variety of passive forensic and related anti-foren... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论