Showing 181 - 200 results of 4,977 for search '"Tampere"', query time: 1.41s Refine Results
  1. 181
    by R.W. Ojakangas
    Published 1986-06-01
    ...The metasedimentary sequence of the Tampere Schist belt, where it has undergone only slight...
    Get full text
    Article
  2. 182
  3. 183
  4. 184
    by Yu-Jie Chang, Ran-Zan Wang, Ja-Chen Lin
    Published 2008-01-01
    ... in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers...
    Get full text
    Article
  5. 185
    by Xi Li, Hui Yang, Jingyu Zhang, Guoping Qian, Huanan Yu, Jun Cai
    Published 2021-09-01
    ... the time-domain process of tamper displacement is presented in this paper. The model is simple...
    Get full text
    Article
  6. 186
    by Ta-Hsun Kuo, 郭達勳
    Published 2003
    ... hiding techniques are proposed to detect a tampered medical image and recover the original image...
    Get full text
    Others
  7. 187
    by Chin-Ho Tsai, 蔡進合
    Published 2010
    ... and more issues occur, such as stealing and tampering images, and it is particularly interesting how...
    Get full text
    Others
  8. 188
  9. 189
    by Siang-Fu Liao, 廖祥富
    Published 2014
    ... decision. Therefore, a tampered image detection method is important and useful. The image format this study...
    Get full text
    Others
  10. 190
    Subjects: ...forensics, video, localization tampering, manipulation....
    Get full text
    Article
  11. 191
    by Shuai Ren, Tao Zhang, Meng Wang, Khurram Shahzad
    Published 2020-01-01
    ... the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering...
    Get full text
    Article
  12. 192
  13. 193
  14. 194
  15. 195
  16. 196
  17. 197
    by Chan-Ban Lai, 賴建邦
    Published 2013
    ... watermarking scheme for image content authentication with tampered localization and image recovery...
    Get full text
    Others
  18. 198
    by Cheonshik Kim, Ching-Nung Yang
    Published 2021-01-01
    ... on Absolute Moment Block Truncation Coding (AMBTC) for reconstructing tampered images by cropping attacks...
    Get full text
    Article
  19. 199
  20. 200