C Hu, F Yang, X Xing, H Liu, T Xiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Robustness, discrimination and security are essential characteristics of perceptual image hashing in cloud computing. In this paper, we propose two image hashing schemes based …
AB Alkodre, NM Bahbouh, S Sendra… - … , Materials & Continua, 2024 - riunet.upv.es
[EN] In Saudi Arabia, drones are increasingly used in different sensitive domains like military, health, and agriculture to name a few. Typically, drone cameras capture aerial …
S Midya, P Chowdhuri, P Pal - Journal of Electronic Imaging, 2024 - spiedigitallibrary.org
We propose a reversible data-hiding approach in encrypted images (RDHEI) to cope with the new security threats emerging with artificial intelligence and the Industrial Internet of …
O Laktionov, A Yanko, A Hlushko - Technology audit and …, 2024 - journals.uran.ua
The object of the study is the process of diagnosing complex-shaped objects in a video stream. The paper investigates the applied problem of creating a hardware-software solution …