Detecting post editing of multimedia images using transfer learning and fine tuning

S Jonker, M Jelstrup, W Meng, B Lampe - ACM Transactions on …, 2024 - dl.acm.org
In the domain of general image forgery detection, a myriad of different classification
solutions have been developed to distinguish a “tampered” image from a “pristine” image. In …

A multi-layer encryption with AES and Twofish encryption algorithm for smart assistant security

S Neelakandan, S Velmurugan, M Prakash… - Digital Image …, 2024 - taylorfrancis.com
By managing Internet of Things devices, smart home automation solutions enable
consumers to transform their homes into smart homes. Smartphone apps enable users to …

Towards A Novel Ultrasonic Side-channel Attack on Mobile Devices

Y Duan, W Meng, WY Chiu, Y Wang - Proceedings of the ACM …, 2024 - dl.acm.org
In this work, we introduce an innovative ultrasonic side-channel attack that can leak users'
data on smart devices, through leveraging Browser Extensions in terms of their streamlined …