Showing 181 - 200 results of 5,298 for search '"Tampere"', query time: 0.16s Refine Results
  1. 181
  2. 182

    Implementation of an Image Tampering Detection System with a CMOS Image Sensor PUF and OP-TEE by Tatsuya Oyama, Manami Hagizaki, Shunsuke Okura, Takeshi Fujino

    Published 2024-11-01
    “…There have been reports of physical attacks on image sensor interfaces by tampering with images to cause misclassifications in AI classification results. …”
    Get full text
    Article
  3. 183
  4. 184

    Self-Embedding Fragile Watermarking Scheme to Detect Image Tampering Using AMBTC and OPAP Approaches by Cheonshik Kim, Ching-Nung Yang

    Published 2021-01-01
    “…In this paper, we propose a self-embedded watermarking technique based on Absolute Moment Block Truncation Coding (AMBTC) for reconstructing tampered images by cropping attacks and forgery. AMBTC is suitable as a recovery bit (watermark) for the tampered image. …”
    Get full text
    Article
  5. 185
  6. 186
  7. 187

    A PUF-based data-device hash for tampered image detection and source camera identification by Zheng, Yue, Cao, Yuan, Chang, Chip-Hong

    Published 2020
    “…Unfortunately, existing solutions that address image tampering problems fail to identify the device that produces the images or footage while techniques that can identify the camera is incapable of locating the tampered content of its captured images. …”
    Get full text
    Journal Article
  8. 188
  9. 189
  10. 190

    Privacy-Preserving Detection of Tampered Radio-Frequency Transmissions Utilizing Federated Learning in LoRa Networks by Nurettin Selcuk Senol, Mohamed Baza, Amar Rasheed, Maazen Alsabaan

    Published 2024-11-01
    “…LoRa networks, widely adopted for low-power, long-range communication in IoT applications, face critical security concerns as radio-frequency transmissions are increasingly vulnerable to tampering. This paper addresses the dual challenges of privacy-preserving detection of tampered transmissions and the identification of unknown attacks in LoRa-based IoT networks. …”
    Get full text
    Article
  11. 191

    Optimal Semi-Fragile Watermarking Based on Maximum Entropy Random Walk and Swin Transformer for Tamper Localization by P. Aberna, L. Agilandeeswari

    Published 2024-01-01
    “…In the multimedia arena, image tampering is an uncontrollable process that necessitates content authentication and tamper detection in a variety of applications. …”
    Get full text
    Article
  12. 192
  13. 193
  14. 194

    Mehrsprachige Germanistinnen im Beruf. Ergebnisse einer explorativen Verbleibstudie unter Germanistikalumnae der Universität Tampere by Sarianna Aho, Jutta Lankinen, Meeri Pekkola, Pekka Rantanen, Ewald Reuter, Stephanie Silvan, Katariina Ylönen

    Published 2017-10-01
    “…In diesem Beitrag werden die zentralen Ergebnisse einer im Frühjahr 2016 durchgeführten Verbleibstudie unter 36 Alumnae des Masterprogramms Deutsche Sprache und Kultur der Universität Tampere vorgestellt und erörtert. Nach der Darstellung des Forschungsdesigns werden folgende Aspekte summarisch präsentiert: a) Statistik über die von den Alumnae erworbenen/verwendeten Sprachen, b) Mehrsprachigkeit in Elternhaus und Schule, c) Auslandsaufenthalte, d) Gründe für die Studienfach-, Studienort- und Berufswahl, e) Mehrsprachigkeit im Berufsleben, f) hidden competences und g) sprachenbezogene studentische Identitätsarbeit. …”
    Get full text
    Article
  15. 195
  16. 196

    Experimental Research on the Formation of the Third Body on the Friction Surface of Coal Cake Tamper Hammer Lifting Mechanism by Lin Huang, Shengfang Zhang, Bingtao Qin, Yu Liu, Zhihua Sha

    Published 2023-06-01
    “…In order to avoid the adverse effect of the third body on the surface of the friction pair, this paper studies the formation of the third body on the friction surface of the lifting hammer mechanism of the coal cake tamper. The cam material (Q345B) of the hammer lifting mechanism and the copper-based powder-metallurgy composite material of the friction plate of the tamping hammer are prepared into the pin-disk friction test disk and pin, respectively. …”
    Get full text
    Article
  17. 197

    A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities by Sunpreet Sharma, Ju Jia Zou, Gu Fang

    Published 2022-01-01
    “…Moreover, in the case of tampering, the proposed scheme not only authenticates and provides copyright protection to images but can also detect tampering and localise the tampered regions. …”
    Get full text
    Article
  18. 198

    The Role of Positive Energy Districts through the Lens of Urban Sustainability Protocols in the Case Studies of Salzburg and Tampere by Marco Volpatti, Elena Mazzola, Marta Carla Bottero, Adriano Bisello

    Published 2023-12-01
    “…To test a methodology that could be extended in future case studies, an analysis of three of the world’s best-known certification systems, LEED-ND, BREEAM-CM, and CASBEE-UD, was conducted on two completed PEDs case studies, Tampere and Salzburg.…”
    Get full text
    Article
  19. 199
  20. 200