Blind semi-fragile watermarking scheme for video authentication in video surveillance context
With the development of advanced multimedia editing tools, numerous unauthorized
manipulations are easily doable to surveillance systems video files. Thus, video tamper …
manipulations are easily doable to surveillance systems video files. Thus, video tamper …
Steganography of encrypted messages inside valid QR codes
Steganography is considered the first line of defense in information security as it hides a
secret message (payload) inside an innocent looking file (container) to transfer the payload …
secret message (payload) inside an innocent looking file (container) to transfer the payload …
Mamdani FIS Combined With LU Decomposition Method and Two-Level LWT for Image Watermarking Technique
Fuzzy theory and linear algebra have a substantial role in various sciences and the biggest
effect was in the share of computer science. In the field of image processing, the process of …
effect was in the share of computer science. In the field of image processing, the process of …
Reversible video steganography using quick response codes and modified elgamal cryptosystem
R Mstafa - Computers, Materials & Continua, CMC, 2022 - papers.ssrn.com
The rapid transmission of multimedia information has been achieved mainly by recent
advancements in the Internet's speed and information technology. In spite of this …
advancements in the Internet's speed and information technology. In spite of this …
Anaglyph video smell presentation using micro-porous piezoelectric film olfactory display
Anaglyph video (ie, 3D video) is a recent trend in movies and multimedia; the method has
also been recently developed for conversion of such videos from traditional 2D screens or …
also been recently developed for conversion of such videos from traditional 2D screens or …
Comprehensive display of digital image copy-move forensics techniques
Digital Images considered as a natural and effective communication media to the human,
owing to the swiftly and the easy manner to comprehend their content. After the appearing of …
owing to the swiftly and the easy manner to comprehend their content. After the appearing of …
An efficient and fast digital image copy-move forensic technique
Digital images consider as an active and natural media for carrying worth information over
the world. With the release of high-resolution digital cameras, PCs, and developed photo …
the world. With the release of high-resolution digital cameras, PCs, and developed photo …
QR Code-based Digital Watermarking For Protecting Personal Information On CT-Scan Images
MI Ripandi, AI Hadiana… - 2024 11th International …, 2024 - ieeexplore.ieee.org
In the current digital era, the rapid exchange and transmission of medical images,
particularly CT-Scan images, have heightened concerns about data security and privacy …
particularly CT-Scan images, have heightened concerns about data security and privacy …
Smart Retailing: A Novel Approach for Retailing Business
G Parmar - Big Data Analytics, 2022 - taylorfrancis.com
This chapter provides, first, the brief of retailing with its definition and its types for
understanding the retailing process. Then after that, the chapter contains different aspects …
understanding the retailing process. Then after that, the chapter contains different aspects …
Algebraic Authentication Scheme
A zero knowledge proof is a type of authentication scheme, which gives no knowledge
beyond the authenticity for identifying an entity. Ring theory plays an important role in …
beyond the authenticity for identifying an entity. Ring theory plays an important role in …