9   Artículos

 
en línea
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Chunyan Zeng, Shuai Kong, Zhifeng Wang, Kun Li and Yuhao Zhao    
In recent years, digital audio tampering detection methods by extracting audio electrical network frequency (ENF) features have been widely applied. However, most digital audio tampering detection methods based on ENF have the problems of focusing on spa... ver más
Revista: Information    Formato: Electrónico

 
en línea
Qian Li, Rangding Wang and Dawen Xu    
Surveillance systems are ubiquitous in our lives, and surveillance videos are often used as significant evidence for judicial forensics. However, the authenticity of surveillance videos is difficult to guarantee. Ascertaining the authenticity of surveill... ver más
Revista: Information    Formato: Electrónico

 
en línea
Xiaoyan Yu, Chengyou Wang and Xiao Zhou    
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people?s attention. The fragile watermark for integrity authentica... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Basma Badawi Hathout,Samy Ghoniemy,Osman Ibrahim     Pág. pp. 6 - 23
In spite of all the advantages delivered by cloud computing, several challenges are hindering the migration of customer software and data into the cloud. On top of the list is the security and privacy concerns arising from the storage and processing of s... ver más

« Anterior     Página: 1 de 1     Siguiente »