Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Ravindranath C. Cherukuri"'
Publikováno v:
Third Congress on Intelligent Systems ISBN: 9789811992247
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::92a42b9881f6f00d1196b5b05f1d8929
https://doi.org/10.1007/978-981-19-9225-4_10
https://doi.org/10.1007/978-981-19-9225-4_10
Publikováno v:
2022 International Conference on Intelligent Controller and Computing for Smart Power (ICICCSP).
Publikováno v:
International Journal of Computer Applications. 175:1-6
Publikováno v:
International Journal of Computer Sciences and Engineering. 7:1088-1094
Publikováno v:
2019 International Conference on Data Science and Communication (IconDSC).
Elicitation about the genesis of an entity is referred to as provenance. With regards to data objects and their relationships the same is termed as data provenance. In majority of the instances, provenance data is sensitive and a small variation or a
Publikováno v:
2018 International Conference on Inventive Research in Computing Applications (ICIRCA).
The developments in the information technology has led the modern world to rely on the internet for digital information. People around the world depend on the internet for every information from general information to sharing confidential data over t
Publikováno v:
International Journal of Innovative Computing and Applications. 10:194
Explicit specification of the historical record of an instance or a data item is called data provenance. It has many applications in various fields with regards to its importance on capturing data flow mechanisms. However, on the other hand, there ar
Publikováno v:
2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
It is with the advancement of overwhelming wireless internet access in mobile environments, users and usage data has become huge and voluminous on regular basis. For instance, the financial transactions performed via online by users are unsecure and
Publikováno v:
SMC
The need of encrypted data has increased in our day to day life. In this paper, we discuss an encryption technique based on Logical Transforms. The secret keys used in this technique to encrypt the images were based on the logical transforms that sat
Publikováno v:
SPIE Proceedings.
In this paper, we propose a new adaptive embedding technique which decomposes the image into various bitplanes based on redundant number systems. This technique is driven by three separate functions: 1) Adaptive selection of locations and number of b