S Liu, Z Pan, H Song - IET image processing, 2017 - Wiley Online Library
With the rapid development of computer science, problems with digital products piracy and copyright dispute become more serious; therefore, it is an urgent task to find solutions for …
In this paper, we present an approach for minimizing the computational complexity of the trained convolutional neural networks (ConvNets). The idea is to approximate all elements …
R Artru, A Gouaillard, T Ebrahimi - arXiv preprint arXiv:1908.02039, 2019 - arxiv.org
Digital Watermarking is an extremely wide aspect of information security, either by its applications, by its properties, or by its designs. In particular, a lot of research has been …
J Tan, Q Yuan, W Guo, N Xie, F Liu, J Wei, X Zhang - Sensors, 2022 - mdpi.com
Deep reinforcement learning provides a new approach to solving complex signal optimization problems at intersections. Earlier studies were limited to traditional traffic …
AM Joshi, S Gupta, M Girdhar, P Agarwal… - Proceedings of the …, 2017 - Springer
The communication has become faster and easier through the Internet. The creation and delivery of various data (video, images, speech and audio) have grown by many fold …
G Dhevanandhini, G Yamuna - Multimedia Systems, 2021 - Springer
Now, all satellite channels handle high-quality data, including HD video files (1 K, 2 K, and 4 K). High-quality compression software is required to archive and transmit these files …
Y Cao, F Yu, Y Tang - IEEE Access, 2020 - ieeexplore.ieee.org
Digital watermarking has the properties such as invisibility and anti-aggression, so the digital watermarking technology has been widely used in copyright protection, information …
The prevalence of wireless networks has made the long-term need for communications security more imperative. In various wireless applications, images and/or video constitute …
V Sharma, AM Joshi - Wireless Personal Communications, 2022 - Springer
Biometric authentications systems are being recognized as the better way of securing data or personal devices as they are unique. Face is considered the best way to authenticate …