Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Learning-based image steganography and watermarking: A survey
K Hu, M Wang, X Ma, J Chen, X Wang… - Expert Systems with …, 2024 - Elsevier
Extensive research has been conducted on image steganography and watermarking
algorithms, owing to their crucial rules in secret data transmission, copyright protection, and …
algorithms, owing to their crucial rules in secret data transmission, copyright protection, and …
[HTML][HTML] Secure watermarking schemes and their approaches in the IoT technology: an overview
Information security is considered one of the most important issues in various infrastructures
related to the field of data communication where most of the modern studies focus on finding …
related to the field of data communication where most of the modern studies focus on finding …
Digital watermarking-based cryptosystem for cloud resource provisioning
Cloud computing resource privacy is important and it becomes stronger when image-based
security is applied. Most cloud service providers provision resources for images to the end …
security is applied. Most cloud service providers provision resources for images to the end …
[PDF][PDF] New Fragile Watermarking Technique to Identify Inserted Video Objects Using H. 264 and Color Features.
The transmission of video content over a network raises various issues relating to copyright
authenticity, ethics, legality, and privacy. The protection of copyrighted video content is a …
authenticity, ethics, legality, and privacy. The protection of copyrighted video content is a …
An Analytical Analysis of the Present-Day Procedures for Disposing of Waste
BK Pandey, VK Nassa, D Pandey… - … of Research on Safe …, 2023 - igi-global.com
Population growth, urbanisation, industry, modernization, and digitalization increase
residential, industrial, commercial, mining, radioactive, agricultural, hospital, and electronic …
residential, industrial, commercial, mining, radioactive, agricultural, hospital, and electronic …
Video Data Authentication Using a Smart Contract Published on the Blockchain
NAA Moneim, MT Gaata - 2022 Fifth College of Science …, 2022 - ieeexplore.ieee.org
With the significant advancement in digital photo and video editing software, it is becoming
very easy to modify digital video content. However, because of the increased misuse of such …
very easy to modify digital video content. However, because of the increased misuse of such …
Improving the visual quality of a size deterministic visual cryptography scheme for Grayscale Images
To enhance the security choices in transmission of information over the web, various
methods such as cryptography, steganography and digital watermarking have been …
methods such as cryptography, steganography and digital watermarking have been …
A software/hardware secure watermarking scheme for Internet of Things applications
R Dalbouchi, A Zitouni - Multimedia Tools and Applications, 2023 - Springer
The security of applications that run over limited resources such as the Internet of Things
becomes a new challenge for researchers. Digital watermarking (WM) is among the …
becomes a new challenge for researchers. Digital watermarking (WM) is among the …
Comprehensive review on video watermarking security threats, challenges, and its applications
I Joseph, J Mandala - ECS Transactions, 2022 - iopscience.iop.org
Data is a crucial resource for every business, and it must be protected both during storage
and transmission. One efficient way of securing data and transferring it is through digital …
and transmission. One efficient way of securing data and transferring it is through digital …
[PDF][PDF] Robust and Secure Video Authentication: A Hash-Based Watermarking Approach
P Saini, R Ahuja - IAENG International Journal of Computer Science, 2024 - iaeng.org
While video is a vital component of modern communication, it also presents opportunities for
manipulation and unauthorized access. The preservation and authenticity of video footage …
manipulation and unauthorized access. The preservation and authenticity of video footage …