A reversible natural language watermarking for sensitive information protection
Existing methods have evolved from using synonym substitution to incorporating arbitrary
word substitution to achieve reversible natural language watermarking. However, a notable …
word substitution to achieve reversible natural language watermarking. However, a notable …
Watermarking technique for document images using discrete curvelet transform and discrete cosine transform
B Singh, MK Sharma - Multimedia Tools and Applications, 2024 - Springer
In this paper, a watermarking technique based on discrete curvelet transform and discrete
cosine trans-form is proposed to protect the color document images. The six layers of the …
cosine trans-form is proposed to protect the color document images. The six layers of the …
[HTML][HTML] Fast and robust JND-guided video watermarking scheme in spatial domain
Generally speaking, those watermarking studies using the spatial domain tend to be fast but
with limited robustness and imperceptibility while those performed in other transform …
with limited robustness and imperceptibility while those performed in other transform …
[PDF][PDF] A textual and visual features-jointly driven hybrid intelligent system for digital physical education teaching quality evaluation
B Zeng, J Zhao, S Wen - Mathematical Biosciences and Engineering, 2023 - core.ac.uk
The utilization of intelligent computing in digital teaching quality evaluation has been a
practical demand in smart cities. Currently, related research works can be categorized into …
practical demand in smart cities. Currently, related research works can be categorized into …
A secured compression technique based on encoding for sharing electronic patient data in slow-speed networks
Healthcare systems capture patients' data using different medical equipment and store it in
the databases with a continual increase in data volume. The continuous processing and …
the databases with a continual increase in data volume. The continuous processing and …
Intelligent evaluation algorithm of English writing based on semantic analysis
J Wang, B Liu - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
In order to solve the intelligent evaluation of English writing, this paper proposes a method
based on the English semantic neural network algorithm. This paper first briefly analyzes the …
based on the English semantic neural network algorithm. This paper first briefly analyzes the …
[PDF][PDF] Digital Text Document Watermarking Based Tampering Attack Detection via Internet.
Owing to the rapid increase in the interchange of text information through internet networks,
the reliability and security of digital content are becoming a major research problem …
the reliability and security of digital content are becoming a major research problem …
Research on Retrieval Method of Online English Grammar Questions Based on Natural Language Processing
L Yu - International Journal of Emerging Technologies in …, 2024 - search.proquest.com
The rapid development of information technology is driving the advancement of natural
language processing. The retrieval of grammatical problems in natural language processing …
language processing. The retrieval of grammatical problems in natural language processing …
A comparative study between RIPEMD160 and SHA256 hash functions on digital Holy Quran integrity verification
NM Al-Aidroos, HS Baqtian - International Journal of Scientific …, 2022 - indianjournals.com
In Data Security and Cryptography areas, hash functions play a fundamental and important
role in the field of Integrity, This paper presents a performance evaluation of two …
role in the field of Integrity, This paper presents a performance evaluation of two …
Three hash functions comparison on digital holy quran integrity verification
HS Baqtian, NM Al-Aidroos - International Journal of Scientific …, 2023 - indianjournals.com
This paper provides a study of hash functions comparison on holy Quran integrity verification
to ensure integrity of data in digital copy of holy Quran. There are many methods available in …
to ensure integrity of data in digital copy of holy Quran. There are many methods available in …