Showing 141 - 160 results of 5,822 for search '"Tampere"', query time: 0.16s Refine Results
  1. 141

    Reversible Medical Image Watermarking for Tamper Detection and Recovery with Run Length Encoding Compression by Liew, Siau-Chuin, Liew, Siau-Way, Jasni, Mohamad Zain

    Published 2010
    “…The embedded watermark allows tampering detection and tampered image recovery. The watermark is also reversible and data compression technique was used to allow higher embedding capacity.…”
    Get full text
    Get full text
    Article
  2. 142

    A Review of Reversible Medical Image Watermarking Scheme with Tamper Localization and Recovery Capability by Khor, Hui Liang, Liew, Siau-Chuin, Jasni, Mohamad Zain

    Published 2014
    “…This paper reviews the works that have done on the reversible watermarking scheme with tamper localization and recovery capability.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 143

    Penerapan Metode Localization Tampering dan Hashing untuk Deteksi Rekayasa Video Digital by Alfiansyah Imanda Putra Alfian, Rusydi Umar, Abdul Fadlil

    Published 2021-04-01
    Subjects: “…forensics, video, localization tampering, manipulation.…”
    Get full text
    Article
  4. 144
  5. 145

    A bit toggling approach for AMBTC tamper detection scheme with high image fidelity. by Wien Hong, Dan Li, Der-Chyuan Lou, Xiaoyu Zhou, Chien-Hung Chang

    Published 2020-01-01
    “…The existing tamper detection schemes for absolute moment block truncation coding (AMBTC) compressed images are able to detect the tampering. …”
    Get full text
    Article
  6. 146

    A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering by Yu-Jie Chang, Ran-Zan Wang, Ja-Chen Lin

    Published 2008-01-01
    “…The hidden watermark in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers the tampered portion. …”
    Get full text
    Article
  7. 147

    Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques by Valenzise G, Prandi G, Tagliasacchi M, Sarti A

    Published 2009-01-01
    “…<p/> <p>In the past few years, a large amount of techniques have been proposed to identify whether a multimedia content has been illegally tampered or not. Nevertheless, very few efforts have been devoted to identifying which kind of attack has been carried out, especially due to the large data required for this task. …”
    Get full text
    Article
  8. 148

    Identifiable Tampering Multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing by Shuai Ren, Tao Zhang, Meng Wang, Khurram Shahzad

    Published 2020-01-01
    “…Aiming at the security problem of secret information preprocessing and the difficulty of improving the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering multi-carrier image information hiding algorithm based on compressed sensing is proposed. …”
    Get full text
    Article
  9. 149

    Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices by Davor Vinko, Kruno Miličević, Ivica Lukić, Mirko Köhler

    Published 2023-07-01
    “…Alongside identity authentication, it is crucial to ensure resistance against tampering, including safeguarding against unauthorized alterations and protection against device counterfeiting or cloning. …”
    Get full text
    Article
  10. 150
  11. 151
  12. 152
  13. 153
  14. 154
  15. 155

    JPEG recapture image tamper detection method based on block effect grid offset by Wei HUANG,Tian-qiang HUANG,Xue-li ZHANG,Hui XIAO

    Published 2017-12-01
    “…Recaptured images are captured original or distorted image shown on the intermediaries,a high-quality recapture image is difficult to distinguish the authenticity of the human eye.Aimed at the tampering operation of JPEG image,a method of detecting block effect grid offset due to re-compression was proposed.The original image was compressed multiple times did not produce the block effect of the grid offset,and the recapture image,because of the recapture process would introduce background information that was not related to the original image,the re-compression of the block effect grid with the original grid is mismatched,and the average information loss amount of the image was used to detect whether the block effect grid generates an offset or not to detect the recapture image.Experiments show that this method is more accurate than the existing recapture image detection method,and the average detection time is shorter.…”
    Get full text
    Article
  16. 156
  17. 157
  18. 158
  19. 159
  20. 160

    An early Proterozoic metagreywacke-slate turbidite sequence: The Tampere schist belt, southwestern Finland by R.W. Ojakangas

    Published 1986-06-01
    “…The metasedimentary sequence of the Tampere Schist belt, where it has undergone only slight metamorphism, clearly consisted of graded graywackes, siltstones and mudstones. …”
    Get full text
    Article