Suggested Topics within your search.
Suggested Topics within your search.
QA75 Electronic computers. Computer science
11
Social welfare & social services
11
Education
10
History
9
Media studies
9
Internet of things
6
TK Electrical engineering. Electronics Nuclear engineering
6
The environment
6
Society & culture: general
5
Sociology
5
Convolutional neural network
4
Convolutional neural networks
4
Cultural studies
4
Digital storage
4
Network coding
4
Office & workplace
4
Public administration
4
Urban communities
4
Base matrix
3
Block-chain
3
Blockchain
3
Codes (symbols)
3
Coefficient matrix
3
Convolution
3
Data aggregation
3
Error correction
3
Information exchanges
3
Iterative methods
3
Management & management techniques
3
Management accounting & bookkeeping
3
-
1
-
2
-
3
-
4by Goldammer, TinaSubjects: “...Stadtbibliothek Tampere...”
Published 2012
Get full text
Get full text
Get full text
Article -
5by Ball Jr, Maynard Marshall“... of encoding information such that if the encoding is tampered with, the result encodes something either...”
Published 2021
Get full text
-
6“... watermarking scheme for image tamper detection and recovery is proposed to ensure ownership and integrity...”
Get full text
Others -
7
-
8
-
9
-
10“... methods, we propose a new image authentication that not only can prevent images tampered with but also...”
Get full text
Others -
11“..., tampering detection in JPEG images now plays an important role. Tampering on compressed images often involve...”
Get full text
Others -
12“... content is tampered with. In this research, an image authentication scheme is first proposed, which...”
Get full text
Others -
13“... proposed a forensics system to detect the candidate tampered regions which are generated by using the human...”
Get full text
Others -
14“... of yours? If the answer is yes, then you have made some digital tampering. With powerful computer...”
Get full text
Others -
15
-
16“... are transmitted through the network with the risk of being wiretapped and tampered. Therefore, ensuring...”
Get full text
Others -
17“... in tampered images. Several features are extracted from normal and spliced images using spatial grey level...”
Get full text
Article -
18“... sector. Empirically this study is based on the emergent RM cluster in the region of Tampere in Finland...”
Get full text
Article -
19by Rådeskog, Tobias“... a tamper warning in case the system is significantly moved from its place of mounting or subject...”
Published 2012
Get full text
Others -
20