Fatten 发表于 2025-3-25 07:04:29

http://reply.papertrans.cn/43/4217/421694/421694_21.png

oncologist 发表于 2025-3-25 09:32:25

A Secure Medical Image Watermarking Technique for E-Healthcare Applicationshas ensured better health monitoring. This exchange, however, has given rise to many security issues which may occur due to noise in communication channels, mishandling of devices or unauthorized tempering. Thus, there is need of ensuring privacy, data integrity and copyright protection in order to

agonist 发表于 2025-3-25 13:56:38

http://reply.papertrans.cn/43/4217/421694/421694_23.png

Encephalitis 发表于 2025-3-25 18:40:11

Performance Analysis of Invariant Quaternion Moments in Color Image Watermarkingtacks. In this chapter, a performance analysis of the invariant quaternion moment-based methods for color image watermarking is presented. An extensive study of the color image watermarking using a set of quaternion moments. In this comparative study, a unified numerically stable method is utilized

Microgram 发表于 2025-3-25 21:40:25

http://reply.papertrans.cn/43/4217/421694/421694_25.png

Veneer 发表于 2025-3-26 00:31:20

http://reply.papertrans.cn/43/4217/421694/421694_26.png

很像弓] 发表于 2025-3-26 06:15:45

Perceptual Hash Function for Images Based on Hierarchical Ordinal Patternhe image processing techniques. A scheme is required to check the integrity of the digital multimedia. Another issue is efficient indexing and retrieval for multimedia data. Traditional indexing methods are time consuming and inefficient. Huge amount of data are generated by the users due to the gro

cogent 发表于 2025-3-26 09:13:19

Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT)physical, computerized, and social spaces. For enhancing the security level of IoT multimedia data, a block-based security model is proposed. At first, from the collected database some clusters are formed for the high-security process; where selecting an optimal group of data as cluster heads to div

pantomime 发表于 2025-3-26 15:26:54

An Adaptive and Viable Face Identification for Android Mobile Devicess, making smartphones vulnerable to numerous contemporary threats as strong security solutions were not developed while considering resource-constrained devices like mobile phones in mind. A need for such a security solution persists that is capable of delivering strong security without compromising

有害处 发表于 2025-3-26 20:26:51

http://reply.papertrans.cn/43/4217/421694/421694_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Handbook of Multimedia Information Security: Techniques and Applications; Amit Kumar Singh,Anand Mohan Book 2019 Springer Nature Switzerla