![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Dual stage black-box adversarial attack against vision transformer
Relying on wide receptive fields, Vision Transformers (ViTs) are more robust than Convolutional Neural Networks (CNNs). Consequently, some transfer-based attack methods that perform well on CNNs perform poorly...
-
Article
An End-to-End Heart Rate Estimation Scheme Using Divided Space-Time Attention
Remote photoplethysmography (rPPG) realizes contactless heart rate estimation by analyzing the color changes of facial video. However, the color changes in the facial video are not obvious, and the noise intro...
-
Article
An image steganography scheme based on ResNet
In recent years, deep learning has been used in steganography scheme, and the implemented solution had a large hidden capacity. In order to further study the effect of basic deep learning network on image steg...
-
Article
Reversible data hiding in encrypted images based on IWT and chaotic system
In this paper, a reversible data hiding in encrypted image (RDH-EI) algorithm based on integer wavelet transform (IWT) and chaotic system was proposed. The image decrypted and the extracted data by the algorit...
-
Article
An adaptive reversible watermarking in IWT domain
An adaptive reversible watermarking in integer wavelet transform (IWT) domain was proposed in this paper. It could adaptively embed according to the size of the watermark, achieve blind extraction, and the ext...