Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive review on image encryption techniques
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …
authenticate digital images. This paper presents a comprehensive study of various image …
A comprehensive survey of multi-view video summarization
There has been an exponential growth in the amount of visual data on a daily basis
acquired from single or multi-view surveillance camera networks. This massive amount of …
acquired from single or multi-view surveillance camera networks. This massive amount of …
Secure medical data transmission model for IoT-based healthcare systems
Due to the significant advancement of the Internet of Things (IoT) in the healthcare sector,
the security, and the integrity of the medical data became big challenges for healthcare …
the security, and the integrity of the medical data became big challenges for healthcare …
A dynamic four-step data security model for data in cloud computing based on cryptography and steganography
R Adee, H Mouratidis - Sensors, 2022 - mdpi.com
Cloud computing is a rapidly expanding field. It allows users to access computer system
resources as needed, particularly data storage and computational power, without managing …
resources as needed, particularly data storage and computational power, without managing …
Secure and robust fragile watermarking scheme for medical images
Due to the advances in computer-based communication and health services over the past
decade, the need for image security becomes urgent to address the requirements of both …
decade, the need for image security becomes urgent to address the requirements of both …
Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities
Similar to a fingerprint search system, face recognition technology can assist law
enforcement agencies in identifying suspects or finding missing persons. Face recognition …
enforcement agencies in identifying suspects or finding missing persons. Face recognition …
PRMS: design and development of patients' E-healthcare records management system for privacy preservation in third party cloud platforms
In the current digital era, personal data storage on public platforms is a major cause of
concern with severe security and privacy ramifications. This is true especially in e-health …
concern with severe security and privacy ramifications. This is true especially in e-health …
Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems
R Denis, P Madhubala - Multimedia Tools and Applications, 2021 - Springer
The exponential rise in the development of cloud computing environments in the healthcare
field, the protection and confidentiality of the medical records become a primary concern for …
field, the protection and confidentiality of the medical records become a primary concern for …
A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC
Over the past few decades, the art of secretly embedding and communicating digital data
has gained enormous attention because of the technological development in both digital …
has gained enormous attention because of the technological development in both digital …
Hash based encryption for keyframes of diagnostic hysteroscopy
In this paper, we address the problem of confidentiality of keyframes, which are extracted
from diagnostic hysteroscopy data using video summarization. We propose an image color …
from diagnostic hysteroscopy data using video summarization. We propose an image color …