Zobrazeno 1 - 10
of 51
pro vyhledávání: '"Jose Juan Garcia-Hernandez"'
Publikováno v:
Computation, Vol 11, Iss 5, p 97 (2023)
In the big data era, processing large amounts of data imposes several challenges, mainly in terms of performance. Complex operations in data science, such as deep learning, large-scale simulations, and visualization applications, can consume a signif
Externí odkaz:
https://doaj.org/article/7db6a7c82657469b8420e51c2957ebb0
Autor:
Jose Luis Gonzalez-Compean, Victor Jesus Sosa-Sosa, Jose Juan Garcia-Hernandez, Hiram Galeana-Zapien, Hugo German Reyes-Anastacio
Publikováno v:
Sensors, Vol 22, Iss 21, p 8400 (2022)
The rise of digitalization, sensory devices, cloud computing and internet of things (IoT) technologies enables the design of novel digital product lifecycle management (DPLM) applications for use cases such as manufacturing and delivery of digital pr
Externí odkaz:
https://doaj.org/article/30b130c4ecc74e2fa4004428be0d4a2a
Autor:
Alejandra Menendez-Ortiz, Claudia Feregrino-Uribe, Rogelio Hasimoto-Beltran, Jose Juan Garcia-Hernandez
Publikováno v:
IEEE Access, Vol 7, Pp 132662-132681 (2019)
In recent years, the growth of the Internet along with multimedia data delivery, have caused the misuse and even alteration of the original digital content. As a security mechanism, digital watermarking has been used to protect digital content, tradi
Externí odkaz:
https://doaj.org/article/ece9e8bf57a44e58a34d451d3a445174
Autor:
Jose Juan Garcia-Hernandez, Claudia Feregrino-Uribe, Alejandra Menendez-Ortiz, Dan Williams Robledo-Cruz
Publikováno v:
Applied Sciences, Vol 12, Iss 14, p 7242 (2022)
In the literature, robust reversible watermarking schemes (RWSs) allow the extraction of watermarks after the images have suffered attacks; however, the modified images are compromised. On the other hand, self-recovery schemes will restore the compro
Externí odkaz:
https://doaj.org/article/e06d566c099a4d91974821907281355f
Publikováno v:
Computers, Vol 10, Iss 7, p 87 (2021)
Although the development of watermarking techniques has enabled designers to tackle normal processing attacks (e.g., amplitude scaling, noise addition, re-compression), robustness against malicious attacks remains a challenge. The discordant size con
Externí odkaz:
https://doaj.org/article/55ca9ff3857b4141a74e76e210cc8a24
Publikováno v:
PLoS ONE, Vol 13, Iss 9, p e0204442 (2018)
Self-recovery schemes identify and restore tampering, using as a reference a compressed representation of a signal embedded into itself. In addition, audio self-recovery must comply with a transparency threshold, adequate for applications such as on-
Externí odkaz:
https://doaj.org/article/0e5bdad9fe3c4047b52ca90a0d1e17be
Autor:
Jose Juan Garcia-Hernandez
Publikováno v:
Entropy, Vol 21, Iss 10, p 996 (2019)
In the data-hiding field, it is mandatory that proposed schemes are key-secured as required by the Kerckhoff’s principle. Moreover, perceptual transparency must be guaranteed. On the other hand, volumetric attack is of special interest in audio dat
Externí odkaz:
https://doaj.org/article/bee11f0035194ade8d30377bee99a7ae
Publikováno v:
International Journal of Advanced Robotic Systems, Vol 12 (2015)
An important challenge in computer vision is the implementation of fast and accurate feature detectors, as they are the basis for high-level image processing analysis and understanding. However, image feature detectors cannot be easily applied in emb
Externí odkaz:
https://doaj.org/article/a086ffc4c28746b69f6384e7fd6d5580
Publikováno v:
PLoS ONE, Vol 8, Iss 6, p e65985 (2013)
Collusion-resistant fingerprinting paradigm seems to be a practical solution to the piracy problem as it allows media owners to detect any unauthorized copy and trace it back to the dishonest users. Despite the billionaire losses in the music industr
Externí odkaz:
https://doaj.org/article/4a89ef51d5b94bd3846a280b971954e5
Publikováno v:
PLoS ONE, Vol 8, Iss 12, p e81976 (2013)
Digital fingerprinting is a technique that consists of inserting the ID of an authorized user in the digital content that he requests. This technique has been mainly used to trace back pirate copies of multimedia content such as images, audio, and vi
Externí odkaz:
https://doaj.org/article/c069a1f273e14db4b8ca3772d2a1ea1e