Zobrazeno 1 - 10
of 143
pro vyhledávání: '"Claudia Feregrino"'
Publikováno v:
IEEE Access, Vol 8, Pp 61504-61516 (2020)
Relational data watermarking techniques using virtual primary key schemes try to avoid compromising watermark detection due to the deletion or replacement of the relation's primary key. Nevertheless, these techniques face the limitations that bring h
Externí odkaz:
https://doaj.org/article/c7c8749b4d8640d794283d1c3c2c895d
Autor:
Jose Juan Garcia-Hernandez, Claudia Feregrino-Uribe, Alejandra Menendez-Ortiz, Dan Williams Robledo-Cruz
Publikováno v:
Applied Sciences, Vol 12, Iss 14, p 7242 (2022)
In the literature, robust reversible watermarking schemes (RWSs) allow the extraction of watermarks after the images have suffered attacks; however, the modified images are compromised. On the other hand, self-recovery schemes will restore the compro
Externí odkaz:
https://doaj.org/article/e06d566c099a4d91974821907281355f
Autor:
Ignacio Algredo-Badillo, Brenda Sánchez-Juárez, Kelsey A. Ramírez-Gutiérrez, Claudia Feregrino-Uribe, Francisco López-Huerta, Johan J. Estrada-López
Publikováno v:
Technologies, Vol 10, Iss 4, p 86 (2022)
The significant volume of sharing of digital media has recently increased due to the pandemic, raising the number of unauthorized uses of these media, such as emerging unauthorized copies, forgery, the lack of copyright, and electronic fraud, among o
Externí odkaz:
https://doaj.org/article/7a25998c405649ccab77cf23f41b7d02
Autor:
Alejandra Menendez-Ortiz, Claudia Feregrino-Uribe, Rogelio Hasimoto-Beltran, Jose Juan Garcia-Hernandez
Publikováno v:
IEEE Access, Vol 7, Pp 132662-132681 (2019)
In recent years, the growth of the Internet along with multimedia data delivery, have caused the misuse and even alteration of the original digital content. As a security mechanism, digital watermarking has been used to protect digital content, tradi
Externí odkaz:
https://doaj.org/article/ece9e8bf57a44e58a34d451d3a445174
Autor:
Ignacio Algredo-Badillo, Kelsey A. Ramírez-Gutiérrez, Luis Alberto Morales-Rosales, Daniel Pacheco Bautista, Claudia Feregrino-Uribe
Publikováno v:
Sensors, Vol 21, Iss 16, p 5655 (2021)
Currently, cryptographic algorithms are widely applied to communications systems to guarantee data security. For instance, in an emerging automotive environment where connectivity is a core part of autonomous and connected cars, it is essential to gu
Externí odkaz:
https://doaj.org/article/7e2adc596308437facadf76bda84a8fd
Autor:
Ignacio Algredo-Badillo, José Julio Conde-Mones, Carlos Arturo Hernández-Gracidas, María Monserrat Morín-Castillo, José Jacobo Oliveros-Oliveros, Claudia Feregrino-Uribe
Publikováno v:
PLoS ONE, Vol 15, Iss 6, p e0234293 (2020)
Several areas, such as physical and health sciences, require the use of matrices as fundamental tools for solving various problems. Matrices are used in real-life contexts, such as control, automation, and optimization, wherein results are expected t
Externí odkaz:
https://doaj.org/article/4b2c99985df54ea999c0d3209233e091
Publikováno v:
PLoS ONE, Vol 13, Iss 9, p e0204442 (2018)
Self-recovery schemes identify and restore tampering, using as a reference a compressed representation of a signal embedded into itself. In addition, audio self-recovery must comply with a transparency threshold, adequate for applications such as on-
Externí odkaz:
https://doaj.org/article/0e5bdad9fe3c4047b52ca90a0d1e17be
Autor:
Luis Rodríguez-Flores, Miguel Morales-Sandoval, René Cumplido, Claudia Feregrino-Uribe, Ignacio Algredo-Badillo
Publikováno v:
PLoS ONE, Vol 13, Iss 1, p e0190939 (2018)
Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we prese
Externí odkaz:
https://doaj.org/article/10905c0c8f094374b869aa2261327d23
Publikováno v:
PLoS ONE, Vol 11, Iss 11, p e0166047 (2016)
Passive content fingerprinting is widely used for video content identification and monitoring. However, many challenges remain unsolved especially for partial-copies detection. The main challenge is to find the right balance between the computational
Externí odkaz:
https://doaj.org/article/66837cc86cce4d31a81526195c719e66
Autor:
Osvaldo Navarro, René Cumplido, Luis Villaseñor-Pineda, Claudia Feregrino-Uribe, Jesús Ariel Carrasco-Ochoa
Publikováno v:
PLoS ONE, Vol 9, Iss 6, p e95418 (2014)
Sequential Pattern Mining is a widely addressed problem in data mining, with applications such as analyzing Web usage, examining purchase behavior, and text mining, among others. Nevertheless, with the dramatic increase in data volume, the current ap
Externí odkaz:
https://doaj.org/article/5b4aa9495f21467099298a1126d72cce