|
|
|
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi...
ver más
|
|
|
|
|
|
|
Li Wang, Xiaosong Yang and Jianjun Zhang
For video style transfer, naively applying still image techniques to process a video frame-by-frame independently often causes flickering artefacts. Some works adopt optical flow into the design of temporal constraint loss to secure temporal consistency....
ver más
|
|
|
|
|
|
|
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang and Yongjin Xian
In today?s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor pr...
ver más
|
|
|
|
|
|
|
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat...
ver más
|
|
|
|
|
|
|
Moatsum Alawida, Je Sen Teh and Wafa? Hamdan Alshoura
Drone-based surveillance has become widespread due to its flexibility and ability to access hazardous areas, particularly in industrial complexes. As digital camera capabilities improve, more visual information can be stored in high-resolution images, re...
ver más
|
|
|
|
|
|
|
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for...
ver más
|
|
|
|
|
|
|
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h...
ver más
|
|
|
|
|
|
|
Argyrios Sideris and Minas Dasygenis
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat...
ver más
|
|
|
|
|
|
|
Jiafu Liu, Zhiyuan Yao, Shirui Guo, Hongjun Xie and Genke Yang
Image classification is widely used in industrial defect detection, medical diagnosis, social welfare, and other fields, in which privacy and security of models and data must be involved. For example, in diamond synthesis, the diamond substrate image ann...
ver más
|
|
|
|
|
|
|
Fatma S. Alrayes, Saud S. Alotaibi, Khalid A. Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen and Abdelwahed Motwakel
Unmanned Aerial Vehicles (UAVs), or drones, provided with camera sensors enable improved situational awareness of several emergency responses and disaster management applications, as they can function from remote and complex accessing regions. The UAVs c...
ver más
|
|
|
|