Found: 23
Select item for more details and to access through your institution.
GPU-Based MPEG-2 to Secure Scalable Video Transcoding.
- Published in:
- International Journal of Digital Crime & Forensics, 2014, v. 6, n. 2, p. 52, doi. 10.4018/ijdcf.2014040104
- By:
- Publication type:
- Article
Countering Spoof: Towards Detecting Deepfake with Multidimensional Biological Signals.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6626974
- By:
- Publication type:
- Article
Countering Spoof: Towards Detecting Deepfake with Multidimensional Biological Signals.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6626974
- By:
- Publication type:
- Article
Anti-steganalysis for image on convolutional neural networks.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 7/8, p. 4315, doi. 10.1007/s11042-018-7046-6
- By:
- Publication type:
- Article
Study on the interaction between the cover source mismatch and texture complexity in steganalysis.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 6, p. 7643, doi. 10.1007/s11042-018-6497-0
- By:
- Publication type:
- Article
Mobile crowd-sensing context aware based fine-grained access control mode.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13977, doi. 10.1007/s11042-015-2693-3
- By:
- Publication type:
- Article
Detection of double MP3 compression Based on Difference of Calibration Histogram.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13855, doi. 10.1007/s11042-015-2758-3
- By:
- Publication type:
- Article
Lossless data hiding algorithm for encrypted images with high capacity.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13765, doi. 10.1007/s11042-015-2920-y
- By:
- Publication type:
- Article
Guest Editorial: Information Hiding and Forensics for Multimedia Security.
- Published in:
- 2016
- By:
- Publication type:
- Editorial
Enhancing the Security of Deep Learning Steganography via Adversarial Examples.
- Published in:
- Mathematics (2227-7390), 2020, v. 8, n. 9, p. 1446, doi. 10.3390/math8091446
- By:
- Publication type:
- Article
Image authentication based on perceptual hash using Gabor filters.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2011, v. 15, n. 3, p. 493, doi. 10.1007/s00500-009-0529-7
- By:
- Publication type:
- Article
Detection defense against adversarial attacks with saliency map.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 12, p. 10193, doi. 10.1002/int.22458
- By:
- Publication type:
- Article
Big Data Analytics for Information Security.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/7657891
- By:
- Publication type:
- Article
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT †.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 7, p. 2697, doi. 10.3390/s22072697
- By:
- Publication type:
- Article
Application-Aware SDN-Based Iterative Reconfigurable Routing Protocol for Internet of Things (IoT).
- Published in:
- Sensors (14248220), 2020, v. 20, n. 12, p. 3521, doi. 10.3390/s20123521
- By:
- Publication type:
- Article
RTIM Hashing: Robust and Compact Video Hashing With a Rotation- and Translation-Invariant Model.
- Published in:
- Computer Journal, 2023, v. 66, n. 11, p. 2741, doi. 10.1093/comjnl/bxac115
- By:
- Publication type:
- Article
SECURE FRACTAL IMAGE CODING BASED ON FRACTAL PARAMETER ENCRYPTION.
- Published in:
- Fractals, 2009, v. 17, n. 2, p. 149, doi. 10.1142/S0218348X09004405
- By:
- Publication type:
- Article
Defend Against Adversarial Samples by Using Perceptual Hash.
- Published in:
- Computers, Materials & Continua, 2020, v. 62, n. 3, p. 1365, doi. 10.32604/cmc.2020.07421
- By:
- Publication type:
- Article
An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection.
- Published in:
- Computers, Materials & Continua, 2018, v. 56, n. 1, p. 151, doi. 10.3970/cmc.2018.02464
- By:
- Publication type:
- Article
Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/2962318
- By:
- Publication type:
- Article
Black-Box Adversarial Attacks against Audio Forensics Models.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6410478
- By:
- Publication type:
- Article
Cyber Crime.
- Published in:
- 2016
- By:
- Publication type:
- Editorial
A framework of adaptive steganography resisting JPEG compression and detection.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2957, doi. 10.1002/sec.1502
- By:
- Publication type:
- Article