The ever-growing numbers of medical digital images and the need to share them among specialists and hospitals for better and more accurate diagnosis require that patients' privacy …
S Xu, X Chen, Y He - Tsinghua Science and Technology, 2021 - ieeexplore.ieee.org
Purchases of electric vehicles have been increasing in recent years. These vehicles differ from traditional fossil-fuel-based vehicles especially in the time consumed to keep them …
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and …
This second edition of The Illustrated Wavelet Transform Handbook: Introductory Theory and Applications in Science, Engineering, Medicine and Finance has been fully updated and …
AC Popescu, H Farid - IEEE Transactions on signal processing, 2005 - ieeexplore.ieee.org
The unique stature of photographs as a definitive recording of events is being diminished due, in part, to the ease with which digital images can be manipulated and altered. Although …
CI Podilchuk, EJ Delp - IEEE signal processing Magazine, 2001 - ieeexplore.ieee.org
Digital watermarking of multimedia content has become a very active research area over the last several years. A general framework for watermark embedding and detection/decoding is …
AC Popescu, H Farid - International workshop on information hiding, 2004 - Springer
A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longer …
CC Lin, WH Tsai - Journal of Systems and software, 2004 - Elsevier
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the additional capabilities of steganography and authentication is proposed. A secret image is …
Y Huang, W Lu, W Sun, D Long - Forensic science international, 2011 - Elsevier
Techniques for digital image tampering are becoming more and more sophisticated and widespread. Copy-move forgery is one of the tampering techniques that are frequently used …