A reversible natural language watermarking for sensitive information protection

L **ang, Y Liu, Z Yang - Information Processing & Management, 2024 - Elsevier
Existing methods have evolved from using synonym substitution to incorporating arbitrary
word substitution to achieve reversible natural language watermarking. However, a notable …

Watermarking technique for document images using discrete curvelet transform and discrete cosine transform

B Singh, MK Sharma - Multimedia Tools and Applications, 2024 - Springer
In this paper, a watermarking technique based on discrete curvelet transform and discrete
cosine trans-form is proposed to protect the color document images. The six layers of the …

[HTML][HTML] Fast and robust JND-guided video watermarking scheme in spatial domain

A Cedillo-Hernandez, L Velazquez-Garcia… - Journal of King Saud …, 2024 - Elsevier
Generally speaking, those watermarking studies using the spatial domain tend to be fast but
with limited robustness and imperceptibility while those performed in other transform …

[PDF][PDF] A textual and visual features-jointly driven hybrid intelligent system for digital physical education teaching quality evaluation

B Zeng, J Zhao, S Wen - Mathematical Biosciences and Engineering, 2023 - core.ac.uk
The utilization of intelligent computing in digital teaching quality evaluation has been a
practical demand in smart cities. Currently, related research works can be categorized into …

A secured compression technique based on encoding for sharing electronic patient data in slow-speed networks

SK Das, MZ Rahman - Heliyon, 2022 - cell.com
Healthcare systems capture patients' data using different medical equipment and store it in
the databases with a continual increase in data volume. The continuous processing and …

Intelligent evaluation algorithm of English writing based on semantic analysis

J Wang, B Liu - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
In order to solve the intelligent evaluation of English writing, this paper proposes a method
based on the English semantic neural network algorithm. This paper first briefly analyzes the …

[PDF][PDF] Digital Text Document Watermarking Based Tampering Attack Detection via Internet.

MA Alohali, M Elsadig, FN Al-Wesabi… - … Systems Science & …, 2024 - cdn.techscience.cn
Owing to the rapid increase in the interchange of text information through internet networks,
the reliability and security of digital content are becoming a major research problem …

Research on Retrieval Method of Online English Grammar Questions Based on Natural Language Processing

L Yu - International Journal of Emerging Technologies in …, 2024 - search.proquest.com
The rapid development of information technology is driving the advancement of natural
language processing. The retrieval of grammatical problems in natural language processing …

A comparative study between RIPEMD160 and SHA256 hash functions on digital Holy Quran integrity verification

NM Al-Aidroos, HS Baqtian - International Journal of Scientific …, 2022 - indianjournals.com
In Data Security and Cryptography areas, hash functions play a fundamental and important
role in the field of Integrity, This paper presents a performance evaluation of two …

Three hash functions comparison on digital holy quran integrity verification

HS Baqtian, NM Al-Aidroos - International Journal of Scientific …, 2023 - indianjournals.com
This paper provides a study of hash functions comparison on holy Quran integrity verification
to ensure integrity of data in digital copy of holy Quran. There are many methods available in …