Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Peisong He"'
Publikováno v:
IET Image Processing, Vol 18, Iss 13, Pp 4114-4126 (2024)
Abstract With the advent of the digital era, millions of facial images are shared online daily, posing severe privacy threats. Generative face anonymization (GFA) methods generate virtual faces to conceal original identities, protecting sensitive inf
Externí odkaz:
https://doaj.org/article/ac558901176a4649b7dddb2bf87d9fa0
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 9, Pp 101792- (2023)
In recent years, deepfake videos have been abused to create fake news, which threaten the integrity of digital videos. Although existing detection methods leveraged cumbersome neural networks to achieve promising detection performance, they cannot be
Externí odkaz:
https://doaj.org/article/5eadbfe5428444c6a40e317de1e812ae
Publikováno v:
IEEE Access, Vol 8, Pp 148997-149010 (2020)
Reversible Data Hiding in Encrypted Images (RDH-EI) has gained much popularity in the field of signal processing and cloud computing. In this study, we propose a high-capacity RDH-EI scheme using multi-layer embedding. It ensures that after extractio
Externí odkaz:
https://doaj.org/article/6b7c11d33d124a4685071fd098e46eea
Publikováno v:
IEEE Access, Vol 7, Pp 95364-95375 (2019)
Double compression detection is of great significance to recover the compression history of suspicious videos and help analyzers locate tampering points in forged videos. However, the lack of efficient methods still haunts researchers when it comes t
Externí odkaz:
https://doaj.org/article/3f88a74581bc4276bbb3bc451b98206a
Publikováno v:
Sensors, Vol 20, Iss 17, p 4743 (2020)
With the development of 3D rendering techniques, people can create photorealistic computer graphics (CG) easily with the advanced software, which is of great benefit to the video game and film industries. On the other hand, the abuse of CGs has threa
Externí odkaz:
https://doaj.org/article/7e939aa3d9dd441abdcae94e59119529
Publikováno v:
Computers, Materials & Continua. 75:4893-4915
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:769-783
Publikováno v:
IEEE Transactions on Systems, Man, and Cybernetics: Systems. 52:7833-7844
Publikováno v:
IEEE Transactions on Fuzzy Systems. 30:3347-3359
This paper focuses on the design of fuzzy secure control for a class of coupled systems, which are modeled by a nonlinear $N$ -dimensional (N-D) parabolic partial differential equation (PDE) subsystem and an ordinary differential equation (ODE) subsy
Autor:
Yi Chen, Peisong He, Kim-Kwang Raymond Choo, Hongxia Wang, Zoran Salcic, Mohamed Ali Kaafar, Xuyun Zhang
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2405-2420
Cost assignment plays a key role in coding performance and security of video steganography. Existing cost assignment methods (for adaptive video steganography) are designed for specific transform coefficients rather than all transform coefficients. I