|
|
|
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl...
ver más
|
|
|
|
|
|
|
Chunyan Zeng, Shuai Kong, Zhifeng Wang, Kun Li and Yuhao Zhao
In recent years, digital audio tampering detection methods by extracting audio electrical network frequency (ENF) features have been widely applied. However, most digital audio tampering detection methods based on ENF have the problems of focusing on spa...
ver más
|
|
|
|
|
|
|
Qian Li, Rangding Wang and Dawen Xu
Surveillance systems are ubiquitous in our lives, and surveillance videos are often used as significant evidence for judicial forensics. However, the authenticity of surveillance videos is difficult to guarantee. Ascertaining the authenticity of surveill...
ver más
|
|
|
|
|
|
|
Xiaoyan Yu, Chengyou Wang and Xiao Zhou
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people?s attention. The fragile watermark for integrity authentica...
ver más
|
|
|
|
|
|
|
Basma Badawi Hathout,Samy Ghoniemy,Osman Ibrahim
Pág. pp. 6 - 23
In spite of all the advantages delivered by cloud computing, several challenges are hindering the migration of customer software and data into the cloud. On top of the list is the security and privacy concerns arising from the storage and processing of s...
ver más
|
|
|
|