[HTML][HTML] Beyond Lexical Boundaries: LLM-Generated Text Detection for Romanian Digital Libraries

M Nitu, M Dascalu - Future Internet, 2024 - mdpi.com
Machine-generated content reshapes the landscape of digital information; hence, ensuring
the authenticity of texts within digital libraries has become a paramount concern. This work …

[PDF][PDF] An efficient method for digital image watermarking based on PN sequences

S Garg, R Singh - International Journal on Computer …, 2012 - advancedsourcecode.com
In the recent times, the rapid and extensive growth in Internet technology is creating a
pressing need to develop several newer techniques to protect copyright, ownership …

[PDF][PDF] Robustness of correlation based watermarking techniques using WGN against different order statistics filters

RM Thanki, RK Kher, DD Vyas - International Journal of Computer …, 2011 - academia.edu
Digital Watermarking embeds identifying information in an image, which is not always
hidden, in such a manner that it cannot easily be removed. This is used to identify the owner …

Computational intelligence-based steganalysis comparison for RCM-DWT and PVA-MOD methods

TD Sairam, K Boopathybagan - Automatika: časopis za automatiku …, 2019 - hrcak.srce.hr
Sažetak This research article proposes data hiding technique for improving the data hiding
procedure and securing the data transmission with the help of contrast mapping technique …

Stegano-image as a digital signature to improve security authentication system in mobile computing

T Mantoro, DD Permadi… - … Conference on Informatics …, 2016 - ieeexplore.ieee.org
Authentication of any system means providing a security to that system. Securing
confidential information on the mobile platforms has been becoming a typical issue for the …

[HTML][HTML] A new steganography method based on the complex pixels

AH Pour, A Payandeh - 2012 - scirp.org
Today steganography has attracted the attention of many researchers. In this paper, we
propose a new steganography method for secure Data communication on half tone pictures …

Multicamera audio-visual analysis of dance figures

F Ofli, Y Demir, E Erzin, Y Yemez… - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
We present an automated system for multicamera motion capture and audio-visual analysis
of dance figures. The multiview video of a dancing actor is acquired using 8 synchronized …

A digital watermarking algorithm for vector map

F Cheng, H Yin, X Zhang… - … Conference on Challenges …, 2010 - ieeexplore.ieee.org
Digital watermarking has been used for a long time in digital media, such as the information
used in geographic information system (GIS) and digital vector maps, for both authentication …

DCT-based cyber defense techniques

Y Amsalem, A Puzanov, A Bedinerman… - … of Digital Image …, 2015 - spiedigitallibrary.org
With the increasing popularity of video streaming services and multimedia sharing via social
networks, there is a need to protect the multimedia from malicious use. An attacker may use …

[PDF][PDF] ROBUSTNESS OF THE SECRET MESSAGE IN STEGO FILE AGAINST FLIP AND ROTATION ATTACK.

H Paraskevov, S Zhelezov… - Annals: Series …, 2017 - mathematics-and-its-applications …
This paper provides an algorithm to achieve robustness with the extraction of the secret
message from a Stego file after an applied attack from the flip, rotate type, or any random …