Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Aliya Tabassum Abbasi"'
Publikováno v:
Symmetry, Vol 12, Iss 4, p 612 (2020)
This article presents symmetry of sampling, scoring, scaling, filtering and suppression over deep convolutional neural networks in combination with a novel content-based image retrieval scheme to retrieve highly accurate results. For this, fusion of
Externí odkaz:
https://doaj.org/article/b7811ecd25ad459689897552c1ac74fc
Autor:
Aliya Tabassum Abbasi, Rashid Khan, Md. Shohidul Islam, M. Shujah Islam, Zhongfu Ye, Md. Imran Hossain, Nuzhat Naqvi, Rizwan Ullah
Publikováno v:
Circuits, Systems, and Signal Processing. 40:4651-4685
Security and privacy have been continuously compromised in the modern multimedia network by various signal processing attacks. As a result, digital data owners are losing copyright protection, data security, and content authentication. A secure and r
Autor:
Khadija Kanwal, Khawaja Tehseen Ahmad, Naeem Ali, Rashid Khan, Mui-zzud din, Aliya Tabassum Abbasi, Aiza Shabir, Li Jing
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
Symmetry, Vol 12, Iss 612, p 612 (2020)
Symmetry
Volume 12
Issue 4
Symmetry
Volume 12
Issue 4
This article presents symmetry of sampling, scoring, scaling, filtering and suppression over deep convolutional neural networks in combination with a novel content-based image retrieval scheme to retrieve highly accurate results. For this, fusion of
Publikováno v:
Wireless Personal Communications. 103:1563-1585
This paper presents a Multilayer Partially Homomorphic Encryption Text Steganography, an invisible approach for covert communication. Existing text-based schemes are either successive in obtaining high concealing capacity, imperceptibility or robusrn
Nowadays, Web Steganography is massively used for data hiding. The development of web has expanded the interest for strategies that can guarantee data security on site page. This paper utilizes the html labels (tags) to conceal the secret message. Ex
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::03029d875e5655b3796e95e4d330ae4e
Publikováno v:
Wireless Personal Communications. 105:1169-1169
The full name of the first author’s affiliation was not shown in the original publication. It is correctly shown here.