Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every *** of th...
详细信息
Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every *** of these images are insignificant images containing only personal ***, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression.
In IEC-61850-based digital substations, the protection IED’s performance is dependent on merging unit’s vendor implementation, communication networks, and measurement circuit’s health conditions. As the process bus...
详细信息
Oropharyngeal carcinoma is a life-threatening disease that requires prompt diagnosis and treatment. This study uses deep learning algorithms to present a novel method for improving medical imaging to detect oropharyng...
详细信息
The use of assistive technology in the field of education is now a common practice in today's tech-driven era. The implementation is quite rampant in all levels and sections of education, including by special need...
详细信息
Anomaly detection in smart homes is paramount in the prevailing information age as smart devices remain susceptible to sophisticated cyber-attacks. Hackers exploit vulnerabilities such as weak passwords and insecure, ...
详细信息
The esports industry is one of the prominent business sectors in the digital era, particularly, Multiplayer Online Battle Arena (MOBA) games which gain much attention from gamers and streaming audiences. Among such ga...
详细信息
A surveillance system detects emergency vehicles stuck in traffic. This system helps manage traffic because the number of vehicles on the road has been increasing daily for years, causing congestion. This project impl...
详细信息
This paper is concerned with identifying the optimal parameters of solar cell by using a modified spotted hyena optimization algorithm (MSHOA). In the MSHOA, the optimization process initializes random search agents t...
详细信息
A data stream exhibits as a massive unbounded sequence of data elements continuously generated at a high rate. Stream databases raise new challenges for query processing due to both the streaming nature of data which ...
详细信息
New security concerns about the transmission of sensitive data over enormous networks of linked devices have arisen with the advent of the 6G era and the broad adoption of massive machine-type communication (MTC). The...
详细信息
暂无评论