2020
DOI: 10.1109/tcsvt.2019.2922309
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
23
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(23 citation statements)
references
References 32 publications
0
23
0
Order By: Relevance
“…Next, we compute the average contrast. According to (10) and (11), we denote x = H(⊗(B 0 |U)) and y = H(⊗(B 1 |U)) for any participant set U with |U| = k. From (7) and (13), we obtain…”
Section: Contrast Of the Proposed Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Next, we compute the average contrast. According to (10) and (11), we denote x = H(⊗(B 0 |U)) and y = H(⊗(B 1 |U)) for any participant set U with |U| = k. From (7) and (13), we obtain…”
Section: Contrast Of the Proposed Schemementioning
confidence: 99%
“…When k or more of them are stacked together, the secret image will be recognized by the human visual system. This visual decoding method attracted much attention and was used in many applications such as visual image encoding [2][3][4], visual authentication [5,6], and steganography [7][8][9][10], as well as an important solution for secure multimedia content protection on cloud-based media hosting [11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Researching on image and video related secure issues are important in the field of information security, such as image based data hiding [1][2][3], water marking technologies [4], secure image retrieval [5] or other aspects [6][7][8][9][10]. SIS scheme is an important issue in information security that can protect confidential images among multiple participants.…”
Section: Introductionmentioning
confidence: 99%
“…Intelligent analysis for surveillance technology has been a hot topic in multimedia security community. It is the basis of advanced video processing tasks such as follow-up steganography [1], data hiding [2], JPEG compressed [3] and object recognition [4], and is a necessary prerequisite for implementing highlevel intelligent behavior analysis. Object tracking is one of the fundamental tasks in intelligent surveillance technology.…”
Section: Introductionmentioning
confidence: 99%