找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Handbook of Multimedia Information Security: Techniques and Applications; Amit Kumar Singh,Anand Mohan Book 2019 Springer Nature Switzerla

[复制链接]
楼主: Aggrief
发表于 2025-3-25 07:04:29 | 显示全部楼层
发表于 2025-3-25 09:32:25 | 显示全部楼层
A Secure Medical Image Watermarking Technique for E-Healthcare Applicationshas ensured better health monitoring. This exchange, however, has given rise to many security issues which may occur due to noise in communication channels, mishandling of devices or unauthorized tempering. Thus, there is need of ensuring privacy, data integrity and copyright protection in order to
发表于 2025-3-25 13:56:38 | 显示全部楼层
发表于 2025-3-25 18:40:11 | 显示全部楼层
Performance Analysis of Invariant Quaternion Moments in Color Image Watermarkingtacks. In this chapter, a performance analysis of the invariant quaternion moment-based methods for color image watermarking is presented. An extensive study of the color image watermarking using a set of quaternion moments. In this comparative study, a unified numerically stable method is utilized
发表于 2025-3-25 21:40:25 | 显示全部楼层
发表于 2025-3-26 00:31:20 | 显示全部楼层
发表于 2025-3-26 06:15:45 | 显示全部楼层
Perceptual Hash Function for Images Based on Hierarchical Ordinal Patternhe image processing techniques. A scheme is required to check the integrity of the digital multimedia. Another issue is efficient indexing and retrieval for multimedia data. Traditional indexing methods are time consuming and inefficient. Huge amount of data are generated by the users due to the gro
发表于 2025-3-26 09:13:19 | 显示全部楼层
Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT)physical, computerized, and social spaces. For enhancing the security level of IoT multimedia data, a block-based security model is proposed. At first, from the collected database some clusters are formed for the high-security process; where selecting an optimal group of data as cluster heads to div
发表于 2025-3-26 15:26:54 | 显示全部楼层
An Adaptive and Viable Face Identification for Android Mobile Devicess, making smartphones vulnerable to numerous contemporary threats as strong security solutions were not developed while considering resource-constrained devices like mobile phones in mind. A need for such a security solution persists that is capable of delivering strong security without compromising
发表于 2025-3-26 20:26:51 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-16 12:03
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表