Found: 30
Select item for more details and to access through your institution.
JPEG image steganalysis using joint discrete cosine transform domain features.
- Published in:
- Journal of Electronic Imaging, 2010, v. 19, n. 2, p. 023006, doi. 10.1117/1.3421972
- By:
- Publication type:
- Article
A Robust Image Watermarking Based on Image Restoration Using SIFT.
- Published in:
- Radioengineering, 2011, v. 20, n. 2, p. 525
- By:
- Publication type:
- Article
Channel-Wise Spatiotemporal Aggregation Technology for Face Video Forensics.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5524930
- By:
- Publication type:
- Article
PLDP: Personalized Local Differential Privacy for Multidimensional Data Aggregation.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6684179
- By:
- Publication type:
- Article
Adversarial attacks on fingerprint liveness detection.
- Published in:
- EURASIP Journal on Image & Video Processing, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13640-020-0490-z
- By:
- Publication type:
- Article
A robust document image watermarking scheme using deep neural network.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 25, p. 38589, doi. 10.1007/s11042-023-15048-y
- By:
- Publication type:
- Article
Exposing AI-generated videos with motion magnification.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 30789, doi. 10.1007/s11042-020-09147-3
- By:
- Publication type:
- Article
Secure multimedia distribution in cloud computing using re-encryption and fingerprinting.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 21, p. 30297, doi. 10.1007/s11042-018-6981-6
- By:
- Publication type:
- Article
Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 18187, doi. 10.1007/s11042-017-5517-9
- By:
- Publication type:
- Article
A copy-move forgery detection method based on CMFD-SIFT.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 1, p. 837, doi. 10.1007/s11042-016-4289-y
- By:
- Publication type:
- Article
Steganalysis of LSB matching using differences between nonadjacent pixels.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 4, p. 1947, doi. 10.1007/s11042-014-2381-8
- By:
- Publication type:
- Article
Fingerprint liveness detection using multiscale difference co-occurrence matrix.
- Published in:
- Optical Engineering, 2016, v. 55, n. 6, p. 1, doi. 10.1117/1.OE.55.6.063111
- By:
- Publication type:
- Article
Application of cluster nursing in patients with lower limb fractures based on quantitative evaluation model.
- Published in:
- Chinese Evidence-based Nursing, 2024, v. 10, n. 16, p. 2981, doi. 10.12102/j.issn.2095-8668.2024.16.027
- By:
- Publication type:
- Article
Combining Wavelet Transform and LBP Related Features for Fingerprint Liveness Detection.
- Published in:
- IAENG International Journal of Computer Science, 2016, v. 43, n. 3, p. 43
- By:
- Publication type:
- Article
Fall Detection Algorithm Based on Triaxial Accelerometer and Magnetometer.
- Published in:
- Engineering Letters, 2016, v. 24, n. 2, p. 157
- By:
- Publication type:
- Article
Delocalized Electrons via In Situ CNT Growth on Au/g‐C<sub>3</sub>N<sub>4</sub> for Boosting Photocatalytic H<sub>2</sub> Evolution.
- Published in:
- Advanced Sustainable Systems, 2023, v. 7, n. 1, p. 1, doi. 10.1002/adsu.202200134
- By:
- Publication type:
- Article
A Lightweight Convolutional Neural Network with Representation Self-challenge for Fingerprint Liveness Detection.
- Published in:
- Computers, Materials & Continua, 2022, v. 73, n. 1, p. 719, doi. 10.32604/cmc.2022.027984
- By:
- Publication type:
- Article
A screen‐shooting resilient document image watermarking scheme using deep neural network.
- Published in:
- IET Image Processing (Wiley-Blackwell), 2023, v. 17, n. 2, p. 323, doi. 10.1049/ipr2.12653
- By:
- Publication type:
- Article
Recent advances in solar‐driven CO<sub>2</sub> reduction over g‐C<sub>3</sub>N<sub>4</sub>‐based photocatalysts.
- Published in:
- Carbon Energy, 2023, v. 5, n. 2, p. 1, doi. 10.1002/cey2.205
- By:
- Publication type:
- Article
Oxygen doped g‐C<sub>3</sub>N<sub>4</sub> with nitrogen vacancy for enhanced photocatalytic hydrogen evolution.
- Published in:
- Chemistry - An Asian Journal, 2020, v. 15, n. 21, p. 3456, doi. 10.1002/asia.202000912
- By:
- Publication type:
- Article
An Application Review of Artificial Intelligence in Prevention and Cure of COVID-19 Pandemic.
- Published in:
- Computers, Materials & Continua, 2020, v. 65, n. 1, p. 743, doi. 10.32604/cmc.2020.011391
- By:
- Publication type:
- Article
A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment.
- Published in:
- Computers, Materials & Continua, 2019, v. 58, n. 1, p. 27, doi. 10.32604/cmc.2019.02688
- By:
- Publication type:
- Article
Astragalus IV Undermines Multi-Drug Resistance and Glycolysis of MDA-MB-231/ADR Cell Line by Depressing hsa_circ_0001982-miR-206/miR-613 Axis.
- Published in:
- Cancer Management & Research, 2021, v. 13, p. 5821, doi. 10.2147/CMAR.S297008
- By:
- Publication type:
- Article
A Survey on Deepfake Video Detection.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2021, v. 10, n. 6, p. 607, doi. 10.1049/bme2.12031
- By:
- Publication type:
- Article
Secure semantic expansion based search over encrypted cloud data supporting similarity ranking.
- Published in:
- Journal of Cloud Computing (2192-113X), 2014, v. 3, n. 1, p. 1, doi. 10.1186/s13677-014-0008-2
- By:
- Publication type:
- Article
Information Technology Gifted Program under the National Curriculum Reform of Basic Education: A Case Study on a Senior High-School in Shanghai, China.
- Published in:
- Revista de Cercetare si Interventie Sociala, 2020, v. 71, p. 77, doi. 10.33788/rcis.71.5
- By:
- Publication type:
- Article
A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing.
- Published in:
- Information (2078-2489), 2017, v. 8, n. 3, p. 96, doi. 10.3390/info8030096
- By:
- Publication type:
- Article
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/1326235
- By:
- Publication type:
- Article
Steganalysis of least significant bit matching using multi-order differences.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1283, doi. 10.1002/sec.864
- By:
- Publication type:
- Article
A vehicular ad hoc network privacy protection scheme without a trusted third party.
- Published in:
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 12, p. 1, doi. 10.1177/1550147717743696
- By:
- Publication type:
- Article