Suggested Topics within your search.
Suggested Topics within your search.
QA75 Electronic computers. Computer science
11
Social welfare & social services
11
Education
10
History
9
Media studies
9
Internet of things
6
TK Electrical engineering. Electronics Nuclear engineering
6
The environment
6
Society & culture: general
5
Sociology
5
Convolutional neural network
4
Convolutional neural networks
4
Cultural studies
4
Digital storage
4
Network coding
4
Office & workplace
4
Public administration
4
Urban communities
4
Base matrix
3
Block-chain
3
Blockchain
3
Codes (symbols)
3
Coefficient matrix
3
Convolution
3
Data aggregation
3
Error correction
3
Information exchanges
3
Iterative methods
3
Management & management techniques
3
Management accounting & bookkeeping
3
-
181by R.W. Ojakangas“...The metasedimentary sequence of the Tampere Schist belt, where it has undergone only slight...”
Published 1986-06-01
Get full text
Article -
182
-
183
-
184“... in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers...”
Get full text
Article -
185“... the time-domain process of tamper displacement is presented in this paper. The model is simple...”
Get full text
Article -
186“... hiding techniques are proposed to detect a tampered medical image and recover the original image...”
Get full text
Others -
187“... and more issues occur, such as stealing and tampering images, and it is particularly interesting how...”
Get full text
Others -
188
-
189“... decision. Therefore, a tampered image detection method is important and useful. The image format this study...”
Get full text
Others -
190
-
191“... the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering...”
Get full text
Article -
192
-
193
-
194
-
195
-
196
-
197“... watermarking scheme for image content authentication with tampered localization and image recovery...”
Get full text
Others -
198Self-Embedding Fragile Watermarking Scheme to Detect Image Tampering Using AMBTC and OPAP Approaches“... on Absolute Moment Block Truncation Coding (AMBTC) for reconstructing tampered images by cropping attacks...”
Get full text
Article -
199by Anastasia N. Katsaounidou, Antonios Gardikiotis, Nikolaos Tsipas, Charalampos A. DimoulasSubjects: “...Image tampering...”
Published 2020-12-01
Get full text
Article -
200