Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Watermarking techniques for medical data authentication: a survey
With the widespread growth of medical images and improved communication and computer
technologies in recent years, authenticity of the images has been a serious issue for E …
technologies in recent years, authenticity of the images has been a serious issue for E …
Advances in medical image watermarking: a state of the art review
Watermarking has been considered to be a potent and persuasive gizmo for its application
in healthcare setups that work online, especially in the current COVID-19 scenario. The …
in healthcare setups that work online, especially in the current COVID-19 scenario. The …
Dual image-based reversible fragile watermarking scheme for tamper detection and localization
This study proposes an efficient dual image-based reversible fragile watermarking scheme
(DI-RFWS) that can accurately detect and locate the tampering regions from an image. The …
(DI-RFWS) that can accurately detect and locate the tampering regions from an image. The …
An efficient approach for phishing detection using machine learning
The increasing number of phishing attacks is one of the major concerns of security
researchers today. The traditional tools for identifying phishing websites use signature …
researchers today. The traditional tools for identifying phishing websites use signature …
A logistic map based blind and fragile watermarking for tamper detection and localization in images
In real-time data transmission, the protection of multimedia content from unauthorized
access is pivotal. In this context, digital watermarking techniques have drawn significant …
access is pivotal. In this context, digital watermarking techniques have drawn significant …
Logistic-map based fragile image watermarking scheme for tamper detection and localization
In this paper, two logistic-map based fragile image watermarking schemes are proposed.
The first scheme is a conventional irreversible, whereas the second scheme is a reversible …
The first scheme is a conventional irreversible, whereas the second scheme is a reversible …
Semi-Blind watermarking using convolutional attention-based turtle shell matrix for tamper detection and recovery of medical images
A Palani, A Loganathan - Expert Systems with Applications, 2024 - Elsevier
Abstract “Telemedicine or e-medicine” refers to an electronic communication system that
shares medical information from one location to another through the transmission channel …
shares medical information from one location to another through the transmission channel …
Image watermarking between conventional and learning-based techniques: a literature review
Currently, most transactions and exchanges are conducted through the Internet thanks to
technological tools, running the risk of the falsification and distortion of information. This is …
technological tools, running the risk of the falsification and distortion of information. This is …
A secure image watermarking for tamper detection and localization
Data security has become a major concern of present time. Digital image watermarking is
seen as a viable solution to ensure the integrity of image data. Watermarking algorithms can …
seen as a viable solution to ensure the integrity of image data. Watermarking algorithms can …
Comprehensive review of watermarking techniques in deep-learning environments
Recently, the demand for the generation, sharing, and storage of massive amounts of
multimedia information—especially in the form of images—from different intelligent devices …
multimedia information—especially in the form of images—from different intelligent devices …