Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of 2D face recognition techniques
Despite the existence of various biometric techniques, like fingerprints, iris scan, as well as
hand geometry, the most efficient and more widely-used one is face recognition. This is …
hand geometry, the most efficient and more widely-used one is face recognition. This is …
[PDF][PDF] Video watermarking techniques for copyright protection and content authentication
The advancement of Internet services and various storage technologies made video piracy
as an increasing problem particularly with the proliferation of media sharing through the …
as an increasing problem particularly with the proliferation of media sharing through the …
Blind semi-fragile watermarking scheme for video authentication in video surveillance context
With the development of advanced multimedia editing tools, numerous unauthorized
manipulations are easily doable to surveillance systems video files. Thus, video tamper …
manipulations are easily doable to surveillance systems video files. Thus, video tamper …
A new DCT audio watermarking scheme based on preliminary MP3 study
In this paper, a new audio watermarking scheme operating in the frequency domain and
based on neural network architecture is described. The watermark is hidden into the middle …
based on neural network architecture is described. The watermark is hidden into the middle …
Online multi-sprites based video watermarking robust to collusion and transcoding attacks for emerging applications
The rapid growth of network transmission of numeric videos has caused an urgent need for
copyright protection against pirating. Different video watermarking techniques have been …
copyright protection against pirating. Different video watermarking techniques have been …
[PDF][PDF] A Robust Deep Learning-Based Video Watermarking Using Mosaic Generation.
Recently, digital watermarking has benefited from the rise of deep learning and machine
learning approaches. Even while effective deep learning-based watermarking techniques …
learning approaches. Even while effective deep learning-based watermarking techniques …
Migration to object oriented platforms: A state transformation approach
It has become evident that the benefits of object orientation warrant the design and
development of reengineering methods that aim to migrate legacy procedural systems to …
development of reengineering methods that aim to migrate legacy procedural systems to …
Crypto-watermarking system for safe transmission of 3D multiresolution meshes
The idea of digitizing documents to be archived or shared has given rise to a variety of new
data types such as 3D meshes. The sharing of this data type between remote users, using …
data types such as 3D meshes. The sharing of this data type between remote users, using …
A SVM-based zero-watermarking technique for 3D videos traitor tracing
The watermarking layer has a crucial role in a collusion-secure fingerprinting framework
since the hidden information, or the identifier, directly attached to user identification, is …
since the hidden information, or the identifier, directly attached to user identification, is …
A robust video watermarking based on feature regions and crowdsourcing
Video watermarking technique aims at resolving insecurity problems. Recently, many
approaches have been proposed in order to satisfy the new constraints of video applications …
approaches have been proposed in order to satisfy the new constraints of video applications …