Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
One-pass lossless data hiding and compression of remote sensing data
The information obtained by means of spectral remote sensing (ie, the hyperspectral
images) are involved in several real-life scenarios and applications. Historical research …
images) are involved in several real-life scenarios and applications. Historical research …
Efficient compression and encryption for digital data transmission
B Carpentieri - Security and Communication Networks, 2018 - Wiley Online Library
We live in a digital era in which communication is largely based on the exchange of digital
information on data networks. Communication is often pictured as a sender that transmits a …
information on data networks. Communication is often pictured as a sender that transmits a …
On the protection of consumer genomic data in the Internet of Living Things
Several companies have recently emerged to provide online Direct-To-Consumer (DTC)
DNA analysis and sequencing. Those activities will be, in the near future, the foundations of …
DNA analysis and sequencing. Those activities will be, in the near future, the foundations of …
[HTML][HTML] Secure smart cameras by aggregate-signcryption with decryption fairness for multi-receiver IoT applications
Smart cameras are key sensors in Internet of Things (IoT) applications and often capture
highly sensitive information. Therefore, security and privacy protection is a key concern. This …
highly sensitive information. Therefore, security and privacy protection is a key concern. This …
From the paper to the tablet: on the design of an AR-based tool for the inspection of pre-fab buildings. Preliminary results of the SIRAE project
Energy-efficient Buildings (EeB) are demanded in today's constructions, fulfilling the
requirements for green cities. Pre-fab buildings, which are modularly fully-built in factories …
requirements for green cities. Pre-fab buildings, which are modularly fully-built in factories …
Low-cost prioritization of image blocks in wireless sensor networks for border surveillance
Abstract Wireless Sensor Networks (WSNs) are becoming more imperative in monitoring
and surveillance applications, such as border surveillance. For these applications, cameras …
and surveillance applications, such as border surveillance. For these applications, cameras …
[HTML][HTML] An effective grou** method for privacy-preserving bike sharing data publishing
ASMT Hasan, Q Jiang, C Li - Future Internet, 2017 - mdpi.com
Bike sharing programs are eco-friendly transportation systems that are widespread in smart
city environments. In this paper, we study the problem of privacy-preserving bike sharing …
city environments. In this paper, we study the problem of privacy-preserving bike sharing …
Compression‐based steganography
Conventional privacy‐enforcement mechanisms, such as encryption‐based ones, are
frequently used to prevent third‐party eavesdroppers to intercept confidential information …
frequently used to prevent third‐party eavesdroppers to intercept confidential information …
[HTML][HTML] Subliminal channels in visual cryptography
K Koptyra, MR Ogiela - Cryptography, 2022 - mdpi.com
This paper describes three methods of creating a subliminal channel in visual cryptography
that are defined for a (2, 2) sharing scheme. They work by hiding additional covert …
that are defined for a (2, 2) sharing scheme. They work by hiding additional covert …
A model of UAV-based waste monitoring system for urban areas
This paper presents an approach in using unmanned aerial vehicles (UAVs) with remote
imaging for urban waste monitoring. The system is designed to monitor green areas, public …
imaging for urban waste monitoring. The system is designed to monitor green areas, public …