DIUcerts DApp: a blockchain-based solution for verification of educational certificates

SK Shawon, H Ahammad, SZ Shetu… - 2021 12th …, 2021 - ieeexplore.ieee.org
Educational certificate verification is the process of checking and verifying the certificate
legitimacy of graduate students. It is a costly, lengthy, and time-consuming procedure as …

Reducing multiple occurrences of meta-mark selection in relational data watermarking

MLP Gort, M Olliaro, A Cortesi - IEEE Access, 2022 - ieeexplore.ieee.org
Contrary to multimedia data watermarking approaches, it is not recommended that relational
data watermarking techniques consider sequential selection for marks in the watermark and …

Выявление плагиата в графических конструкторских документах в ходе учебного проектирования

ВВ Миронов - Системная инженерия и информационные …, 2023 - siit.ugatu.su
Аннотация В статье рассматривается не исследованная ранее задача выявления
плагиата в графических конструкторских документах в процессе учебного …

[PDF][PDF] A secure image encryption and embedding approach using MRSA and RC6 with DCT transformation

M Ganavi, S Prabhudeva, SN Nayak - International Journal of …, 2022 - academia.edu
The growing potentialities of recent communications necessitate information security on the
computer network. The various fields such as banking, E-commerce, education, and health …

A secure data hiding system in biomedical images using grain 128a algorithm, logistic mapping and elliptical curve cryptography

N George, M Manuel - Multimedia Tools and Applications, 2024 - Springer
Telemedicine and teleconsultations have become rampant today, consequent to the
pandemic scenario as well as the availability of seamless internet connectivity. In this …

A multi-layer cryptosystem for secure data transmission using PRNG

MA Islam, MS Sarker, MS Hossen… - 2020 3rd …, 2020 - ieeexplore.ieee.org
Nowadays the usage of the Internet is developing day by day. One of the largest uses of the
internet is to transfer data from different sources to different states. During data transfer over …

[PDF][PDF] A comparative study of steganography using watermarking and modifications pixels versus least significant bit

H Caballero, V Muñoz… - International Journal of …, 2023 - academia.edu
This article presents a steganography proposal based on embedding data expressed in
base 10 by directly replacing the pixel values from images red, green blue (RGB) with a …

Information hiding in still image based on variable steganography technique to achieve high imperceptibility

RM Rashid, BK Baker, OF Mohammad… - 2021 IEEE 12th …, 2021 - ieeexplore.ieee.org
Information hiding is considered an essential and important process at the present time due
to technological development, advancement and complexity of algorithms. Steganography is …

Multi Level Bank Locker Security System with Digital Signature Authentication and Internet of Things

MA Islam, MS Sarder, MH Mamun, F Ahmed, SK Sarkar… - 2022 - researchsquare.com
Recently bank security is being a matter of great awareness and importance in the world.
Though, we designed a multi-layer Bank security system to preserve the bank locker from …

A Digital Data Hiding Technique with Missing Puzzle and Seek Algorithm

MA Islam, T Tabassum, MS Hossen… - 2020 4th …, 2020 - ieeexplore.ieee.org
presently a day's data dissemination over the world become progressively simpler because
of quick web and advancement of various kind of technology, for this explanation individuals …