Found: 15
Select item for more details and to access through your institution.
Simulation of intelligent target hitting in obstructed path using physical body animation and genetic algorithm.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 8, p. 9763, doi. 10.1007/s11042-018-6575-3
- By:
- Publication type:
- Article
Providing security and privacy to huge and vulnerable songs repository using visual cryptography.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 9, p. 11101, doi. 10.1007/s11042-017-5240-6
- By:
- Publication type:
- Article
Self authenticating medical X-ray images for telemedicine applications.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 7, p. 8375, doi. 10.1007/s11042-017-4738-2
- By:
- Publication type:
- Article
Multi secret sharing with unexpanded meaningful shares.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 5, p. 6287, doi. 10.1007/s11042-017-4536-x
- By:
- Publication type:
- Article
VMVC: Verifiable multi-tone visual cryptography.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 5, p. 5169, doi. 10.1007/s11042-017-4422-6
- By:
- Publication type:
- Article
Novel basis matrix creation and preprocessing algorithms for friendly progressive visual secret sharing with space-efficient shares.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 6, p. 8711, doi. 10.1007/s11042-016-3484-1
- By:
- Publication type:
- Article
XOR based continuous-tone multi secret sharing for store-and-forward telemedicine.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 3, p. 3851, doi. 10.1007/s11042-016-4012-z
- By:
- Publication type:
- Article
Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography.
- Published in:
- Advances in Multimedia, 2023, p. 1, doi. 10.1155/2023/6945340
- By:
- Publication type:
- Article
Optimized Time Synchronized Multilayer MAC Protocol for WSN Using Relay Nodes.
- Published in:
- Adhoc & Sensor Wireless Networks, 2020, v. 48, n. 1-4, p. 1
- By:
- Publication type:
- Article
QUANTIZATION-BASED FRAGILE WATERMARKING USING BLOCK-WISE AUTHENTICATION AND PIXEL-WISE RECOVERY SCHEME FOR TAMPERED IMAGE.
- Published in:
- International Journal of Image & Graphics, 2013, v. 13, n. 2, p. 1, doi. 10.1142/S0219467813400020
- By:
- Publication type:
- Article
Computational Medical Image Reconstruction Techniques: A Comprehensive Review.
- Published in:
- Archives of Computational Methods in Engineering, 2022, v. 29, n. 7, p. 5635, doi. 10.1007/s11831-022-09785-w
- By:
- Publication type:
- Article
Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text.
- Published in:
- Complex & Intelligent Systems, 2023, v. 9, n. 3, p. 2813, doi. 10.1007/s40747-021-00487-7
- By:
- Publication type:
- Article
SecECG: secure data hiding approach for ECG signals in smart healthcare applications.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 14, p. 42885, doi. 10.1007/s11042-023-17049-3
- By:
- Publication type:
- Article
VMD-based ECG signal watermarking using image fusion: a robust and versatile approach for secure telemedical services.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 13, p. 39943, doi. 10.1007/s11042-023-17087-x
- By:
- Publication type:
- Article
A real time cloud-based framework for glaucoma screening using EfficientNet.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 24, p. 34737, doi. 10.1007/s11042-021-11559-8
- By:
- Publication type:
- Article