Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …
applications. Image transformation with a secret key enables us not only to protect visual …
A review on protection and cancelable techniques in biometric systems
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …
constituted by the mechanisms which provide access to a number of services or …
An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images
Reversible data hiding in encrypted images (RDHEI) is an effective technique to embed data
in the encrypted domain. An original image is encrypted with a secret key and during or after …
in the encrypted domain. An original image is encrypted with a secret key and during or after …
Encryption-then-compression systems using grayscale-based image encryption for JPEG images
A block scrambling-based encryption scheme is presented to enhance the security of
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …
Reversible data hiding in encrypted images with distributed source encoding
This paper proposes a novel scheme of reversible data hiding in encrypted images using
distributed source coding. After the original image is encrypted by the content owner using a …
distributed source coding. After the original image is encrypted by the content owner using a …
Order-preserving symmetric encryption
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a
primitive suggested in the database community by Agrawal et al.(SIGMOD'04) for allowing …
primitive suggested in the database community by Agrawal et al.(SIGMOD'04) for allowing …
Content based image retrieval using deep learning process
RR Saritha, V Paul, PG Kumar - Cluster Computing, 2019 - Springer
Content-based image retrieval (CBIR) uses image content features to search and retrieve
digital images from a large database. A variety of visual feature extraction techniques have …
digital images from a large database. A variety of visual feature extraction techniques have …
Privacy-preserving face recognition
Face recognition is increasingly deployed as a means to unobtrusively verify the identity of
people. The widespread use of biometrics raises important privacy concerns, in particular if …
people. The widespread use of biometrics raises important privacy concerns, in particular if …
Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation
In recent years, signal processing applications that deal with user-related data have aroused
privacy concerns. For instance, face recognition and personalized recommendations rely on …
privacy concerns. For instance, face recognition and personalized recommendations rely on …
Hawkes processes for events in social media
This chapter provides an accessible introduction for point processes, and especially Hawkes
processes, for modeling discrete, inter-dependent events over continuous time. We start by …
processes, for modeling discrete, inter-dependent events over continuous time. We start by …