Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Image steganography approaches and their detection strategies: A survey
Steganography is the art and science of hidden (or covered) communication. In digital
steganography, the bits of image, video, audio and text files are tweaked to represent the …
steganography, the bits of image, video, audio and text files are tweaked to represent the …
Image data hiding schemes based on metaheuristic optimization: a review
The digital content exchange on the Internet is associated with information security risks.
Hiding data in digital images is a promising direction in data protection and is an alternative …
Hiding data in digital images is a promising direction in data protection and is an alternative …
[HTML][HTML] Ensemble deep learning derived from transfer learning for classification of COVID-19 patients on hybrid deep-learning-based lung segmentation: a data …
AK Dubey, GL Chabert, A Carriero, A Pasche… - Diagnostics, 2023 - mdpi.com
Background and motivation: Lung computed tomography (CT) techniques are high-
resolution and are well adopted in the intensive care unit (ICU) for COVID-19 disease …
resolution and are well adopted in the intensive care unit (ICU) for COVID-19 disease …
[HTML][HTML] Monitoring the security of audio biomedical signals communications in wearable IoT healthcare
The COVID-19 pandemic has imposed new challenges on the healthcare industry as
hospital staff are exposed to a massive coronavirus load when registering new patients …
hospital staff are exposed to a massive coronavirus load when registering new patients …
Minor blind feature based Steganalysis for calibrated JPEG images with cross validation and classification using SVM and SVM-PSO
The spectacular progress of technology related to the information and communication arena
throughout the past epoch made the internet a powerful media for faster communication of …
throughout the past epoch made the internet a powerful media for faster communication of …
Adult content image recognition by Boltzmann machine limited and deep learning
Adult content images have a detrimental effect on Internet users, a significant number of
whom are minors. Therefore, it is essential to control and detecting adult content images …
whom are minors. Therefore, it is essential to control and detecting adult content images …
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems
For secure communication in a distributed cooperation, generally, the data are encrypted
and decrypted using a symmetric key. The process of creating, distributing, storing …
and decrypted using a symmetric key. The process of creating, distributing, storing …
[HTML][HTML] PFW: polygonal fuzzy weighted—an SVM kernel for the classification of overlap** data groups
Support vector machines are supervised learning models which are capable of classifying
data and measuring regression by means of a learning algorithm. If data are linearly …
data and measuring regression by means of a learning algorithm. If data are linearly …
Feature extraction optimization of JPEG steganalysis based on residual images
JPEG steganalysis is a technique for detecting the existence of secret information hidden in
JPEG images. At present, JPEG steganalysis based on residual images has been widely …
JPEG images. At present, JPEG steganalysis based on residual images has been widely …
Security principles and challenges in electronic voting
An electronic voting system aims to cast and record votes of the legitimate voters while
providing an adequate level of security in the way the votes are cast. These require …
providing an adequate level of security in the way the votes are cast. These require …