Multimedia Security, Volume 1. William PuechЧитать онлайн книгу.
method in a point cloud in the spatial dom...Figure 7.11 Representation of a K-d-B-TreeFigure 7.12 Example of data hiding in a 3D Bunny object with ∆= 10−4: a) origina...
8 Chapter 8Figure 8.1 Illustration of the impact of steganography by LSBR and its detection...Figure 8.2 Illustration of probability distributions (empirical and theoretical)...Figure 8.3 Results of the application of the LRG test, equation [8.14]Figure 8.4. Illustration of the supervised learning principal, which aims to det...Figure 8.5 Illustration of the principle of extraction of RM characteristics (Sp...Figure 8.6 The Yedroudj-Net (Yedroudj et al. 2018b) network
Guide
1 Cover
7 Preface
10 Index
Pages
1 v
2 iii
3 iv
4 xi
5 xii
6 xiii
7 xiv
8 xv
9 xvi
10 xvii
11 1
12 2
13 3
14 4
15 5
16 6
17 7
18 8
19 9
20 10
21 11
22 12
23 13
24 14
25 15
26 16
27 17
28 18
29 19
30 20
31 21
32 22
33 23
34 24
35 25
36 26
37 27
38 28
39 29
40 30
41 31
42 32
43 33
44 34
45 35