Zobrazeno 1 - 10
of 198
pro vyhledávání: '"Ching Chun Chang"'
Publikováno v:
EURASIP Journal on Information Security, Vol 2024, Iss 1, Pp 1-13 (2024)
Abstract Facial recognition systems have emerged as indispensable components in identity verification. These systems heavily rely on facial data, which is stored in a biometric database. However, storing such data in a database raises concerns about
Externí odkaz:
https://doaj.org/article/308da97f9bb84b4da395e60d2bdfdc3c
Publikováno v:
Cryptography, Vol 8, Iss 3, p 41 (2024)
Reversible data-hiding in encrypted images (RDHEI) plays a pivotal role in preserving privacy within images stored on cloud platforms. Recently, Wang et al. introduced a dual-stage permutation encryption scheme, which is highly compatible with RDHEI
Externí odkaz:
https://doaj.org/article/538b4923a2894f158a9f600e1cbdf339
Publikováno v:
Future Internet, Vol 16, Iss 8, p 297 (2024)
As we move into the digital era, the pace of technological advancement is accelerating rapidly. Network traffic often becomes congested during the transmission of large data volumes. To mitigate this, data compression plays a crucial role in minimizi
Externí odkaz:
https://doaj.org/article/5f8434b347ba46b2bd067e395ea6be64
Publikováno v:
Mathematics, Vol 12, Iss 14, p 2219 (2024)
Data hiding in digital images is a potent solution for covert communication, embedding sensitive data into cover images. However, most existing methods are tailored for one-to-one scenarios, which present security risks. To mitigate this vulnerabilit
Externí odkaz:
https://doaj.org/article/d3b34c09aa584f5b8e91a77cd3528112
Publikováno v:
Future Internet, Vol 16, Iss 6, p 210 (2024)
The reversible data hiding scheme in the encrypted domain is a potential solution to the concerns regarding user privacy in cloud applications. The 3D mesh model is an emerging file format and is widely used in engineering modeling, special effects,
Externí odkaz:
https://doaj.org/article/5455b428607a4715a3bed1ffd70f7c12
Publikováno v:
Mathematics, Vol 12, Iss 9, p 1332 (2024)
In recent decades, information security has become increasingly valued, including many aspects of privacy protection, copyright protection, and digital forensics. Therefore, many data hiding schemes have been proposed and applied to various carriers
Externí odkaz:
https://doaj.org/article/531317dfaeb74bd9868bdb907cebba8d
Publikováno v:
IEEE Access, Vol 11, Pp 105027-105039 (2023)
Deepfakes pose an evolving cybersecurity threat that calls for the development of automated countermeasures. While considerable forensic research has been devoted to the detection and localisation of deepfakes, solutions for ‘fake-to-real’ revers
Externí odkaz:
https://doaj.org/article/de6c267cd97f4972b2cc7f4cb88c5127
Publikováno v:
IEEE Access, Vol 11, Pp 3494-3510 (2023)
Deep learning is regarded as a promising solution for reversible steganography. There is an accelerating trend of representing a reversible steo-system by monolithic neural networks, which bypass intermediate operations in traditional pipelines of re
Externí odkaz:
https://doaj.org/article/bfbd0bd400944a4b91b7e7610b025792
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2022, Iss 1, Pp 1-23 (2022)
Abstract Steganographic secret sharing is an access control technique that transforms a secret message into multiple shares in a steganographic sense. Each share is in a human-readable format in order to dispel suspicion from a malicious party during
Externí odkaz:
https://doaj.org/article/0f3975cfe2a74f348079e29e0d029d89
Publikováno v:
Symmetry, Vol 16, Iss 2, p 147 (2024)
In today’s digital landscape, the exponential growth of data heightens security risks associated with traditional centralized storage systems. Utilizing blockchain technology, a shift towards decentralized data storage provides a more secure and pr
Externí odkaz:
https://doaj.org/article/030ea4cfcee04bffb27a0b46d3205402