116   Artículos

« Anterior     Página: 1 de 6     Siguiente »

 
en línea
Jun Park and Youngho Cho    
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad    
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Manjur Kolhar and Sultan Mesfer Aldossary    
Deep learning (DL) algorithms can improve healthcare applications. DL has improved medical imaging diagnosis, therapy, and illness management. The use of deep learning algorithms on sensitive medical images presents privacy and data security problems. Im... ver más
Revista: AI    Formato: Electrónico

 
en línea
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro    
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ibrahim Abunadi, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel and Ishfaq Yaseen    
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of T... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fatma S. Alrayes, Saud S. Alotaibi, Khalid A. Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen and Abdelwahed Motwakel    
Unmanned Aerial Vehicles (UAVs), or drones, provided with camera sensors enable improved situational awareness of several emergency responses and disaster management applications, as they can function from remote and complex accessing regions. The UAVs c... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Hokuto Hirano and Kazuhiro Takemoto    
Deep neural networks (DNNs) are vulnerable to adversarial attacks. In particular, a single perturbation known as the universal adversarial perturbation (UAP) can foil most classification tasks conducted by DNNs. Thus, different methods for generating UAP... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Haidong Zhong, Xianyi Chen and Qinglong Tian    
Recently, reversible image transformation (RIT) technology has attracted considerable attention because it is able not only to generate stego-images that look similar to target images of the same size, but also to recover the secret image losslessly. The... ver más
Revista: Information    Formato: Electrónico

 
en línea
Li-Lian Huang, Shi-Ming Wang and Jian-Hong Xiang    
Since the proposed scheme can efficiently perform image encryption, it can be applied to real-time communication, such as telemedicine.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kaimeng Ding, Fan Meng, Yueming Liu, Nan Xu and Wenjun Chen    
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet... ver más
Revista: Information    Formato: Electrónico

 
en línea
Vina Endah Susanti     Pág. 13 - 21
This study aims to examine the effect of trust, brand image, and security on ticket buying interest on the Traveloka site (a case study of UST Yogyakarta students). The population in this study used students of the economics faculty majoring in accountin... ver más
Revista: Journal of Economic; Bussines and Accounting (COSTING)    Formato: Electrónico

 
en línea
Jiazhu Dai and Siwei Xiong    
Capsule networks are a type of neural network that use the spatial relationship between features to classify images. By capturing the poses and relative positions between features, this network is better able to recognize affine transformation and surpas... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Rui-Hua Liu and Quan Zhou    
With the increasing requirements for the security of medical data, military data, and other data transmission, data hiding technology has gradually developed from only protecting the security of secret data to all transmission data. As a necessary techni... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Lin Huo, Ruipei Chen, Jie Wei and Lang Huang    
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano    
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Moatsum Alawida, Je Sen Teh and Wafa? Hamdan Alshoura    
Drone-based surveillance has become widespread due to its flexibility and ability to access hazardous areas, particularly in industrial complexes. As digital camera capabilities improve, more visual information can be stored in high-resolution images, re... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Neng Zhou, Minqing Zhang, Han Wang, Mengmeng Liu, Yan Ke and Xu An Wang    
To combine homomorphic public key encryption with reversible data hiding, a reversible data hiding scheme in homomorphic encrypted image based on EC-EG is proposed. Firstly, the cover image is segmented. The square grid pixel group randomly selected by t... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zhengmao Ye, Hang Yin and Yongmao Ye    
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Zhengmao Ye, Hang Yin and Yongmao Ye    
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-c... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Tony Gwyn, Kaushik Roy and Mustafa Atay    
In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the futur... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 6     Siguiente »