Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Intelligent energy cyber physical systems (iECPS) for reliable smart grid against energy theft and false data injection
H Jain, M Kumar, AM Joshi - Electrical Engineering, 2022 - Springer
Abstract The Internet of Things (IoT)-based advanced metering infrastructure (AMI) provides
real-time information from smart meters to both grid operators and customers. The meter …
real-time information from smart meters to both grid operators and customers. The meter …
Digital watermarking of video streams: Review of the state-of-the-art
R Artru, A Gouaillard, T Ebrahimi - arxiv preprint arxiv:1908.02039, 2019 - arxiv.org
Digital Watermarking is an extremely wide aspect of information security, either by its
applications, by its properties, or by its designs. In particular, a lot of research has been …
applications, by its properties, or by its designs. In particular, a lot of research has been …
Combined DWT–DCT-based video watermarking algorithm using Arnold transform technique
AM Joshi, S Gupta, M Girdhar, P Agarwal… - Proceedings of the …, 2017 - Springer
The communication has become faster and easier through the Internet. The creation and
delivery of various data (video, images, speech and audio) have grown by many fold …
delivery of various data (video, images, speech and audio) have grown by many fold …
[BOK][B] Digital image watermarking: theoretical and computational advances
The Book presents an overview of newly developed watermarking techniques in various
independent and hybrid domains Covers the basics of digital watermarking, its types …
independent and hybrid domains Covers the basics of digital watermarking, its types …
Device authentication with FPGA based self correcting Physical Unclonable Function for Internet of Things
SK Agarwal, AM Joshi - Microprocessors and Microsystems, 2022 - Elsevier
The device authentication of IoT nodes is very important since they are mainly deployed in
open unsecure environment. Physical Unclonable Function (PUF) is a fingerprint of chip and …
open unsecure environment. Physical Unclonable Function (PUF) is a fingerprint of chip and …
FPGA implementation of semi-fragile reversible watermarking by histogram bin shifting in real time
In this paper, field programmable gate array (FPGA) implementation of reversible
watermarking (RW) algorithm by histogram bin shifting (HBS) that can be used for real-time …
watermarking (RW) algorithm by histogram bin shifting (HBS) that can be used for real-time …
VLSI implementation of reliable and secure face recognition system
V Sharma, AM Joshi - Wireless Personal Communications, 2022 - Springer
Biometric authentications systems are being recognized as the better way of securing data
or personal devices as they are unique. Face is considered the best way to authenticate …
or personal devices as they are unique. Face is considered the best way to authenticate …
Vlsi architecture of block matching algorithms for motion estimation in high efficiency video coding
AM Joshi, A Bramha - Wireless Personal Communications, 2020 - Springer
High-efficiency video coding (HEVC) is a latest video coding standard and the motion
estimation unit is the most important block. The work presents the different types of Matching …
estimation unit is the most important block. The work presents the different types of Matching …
FPGA implementation of multivariate support vector regression for non-invasive blood glucose estimation using IoMT framework
AM Joshi, K Divya, H Chhajed, RS Kamal - IoT Applications for Healthcare …, 2022 - Springer
The higher value of blood glucose would lead to one of the most common chronicle
diseases known as Diabetes. Diabetes has been considered as major diseases among the …
diseases known as Diabetes. Diabetes has been considered as major diseases among the …
An efficient DCT based image watermarking scheme for protecting distribution rights
G Gupta, AM Joshi, K Sharma - 2015 Eighth International …, 2015 - ieeexplore.ieee.org
The chances of copyright violation and piracy have been increased due to growth of
networking and technology. Digital watermark is useful to verify the integrity of the content …
networking and technology. Digital watermark is useful to verify the integrity of the content …