文件名称:f5
下载
别用迅雷、360浏览器下载。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
介绍说明--下载内容均来自于网络,请自行研究使用
Many steganographic systems are weak against visual and
statistical attacks. Systems without these weaknesses offer only a relatively
small capacity for steganographic messages. The newly developed
algorithm F5 withstands visual and statistical attacks, yet it still offers
a large steganographic capacity. F5 implements matrix encoding to
improve the efficiency of embedding. Thus it reduces the number of necessary
changes. F5 employs permutative straddling to uniformly spread
out the changes over the whole steganogram.
statistical attacks. Systems without these weaknesses offer only a relatively
small capacity for steganographic messages. The newly developed
algorithm F5 withstands visual and statistical attacks, yet it still offers
a large steganographic capacity. F5 implements matrix encoding to
improve the efficiency of embedding. Thus it reduces the number of necessary
changes. F5 employs permutative straddling to uniformly spread
out the changes over the whole steganogram.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
21370289.pdf