Blockchain enabled deep learning model with modified coati optimization for sustainable healthcare disease detection and classification [PDF]
The growing number of patients and the emergence of new symptoms and diseases make health monitoring and assessment increasingly complex for medical staff and hospitals.
Heba G. Mohamed +5 more
doaj +2 more sources
Review of video frame rate up conversion detection
Video frame rate up-conversion detection technology is a kind of video forensics technology.In order to systematically elaborate the research progress in the field of video up-conversion detection and guide the follow-up research of video up-conversion ...
Tianqi HE, Xinghao JIANG,Tanfeng SUN
doaj +3 more sources
ARCHANGEL: Tamper-proofing Video Archives using Temporal Content Hashes on the Blockchain [PDF]
We present ARCHANGEL; a novel distributed ledger based system for assuring the long-term integrity of digital video archives. First, we describe a novel deep network architecture for computing compact temporal content hashes (TCHs) from audio-visual ...
Bell, Mark +10 more
core +2 more sources
An Image Authentication Algorithm Using Combined Approach of Watermarking and Vector Quantization
This paper presents a two-stage watermarking technique for image authentication adapting the advantages of vector quantization (VQ). In the proposed algorithm, robust watermark and semifragile watermark are embedded independently in two successive stages.
Tiwari Archana, Sharma Manisha
doaj +1 more source
Coin.AI: A Proof-of-Useful-Work Scheme for Blockchain-based Distributed Deep Learning [PDF]
One decade ago, Bitcoin was introduced, becoming the first cryptocurrency and establishing the concept of "blockchain" as a distributed ledger. As of today, there are many different implementations of cryptocurrencies working over a blockchain, with ...
Baldominos, Alejandro, Saez, Yago
core +2 more sources
Spectrum sharing security and attacks in CRNs: a review [PDF]
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi +2 more
core +3 more sources
Multi-dimensional key generation of ICMetrics for cloud computing [PDF]
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa +3 more
core +2 more sources
Protecting Software through Obfuscation:Can It Keep Pace with Progress in Code Analysis? [PDF]
Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread application in malware and commercial software shows that it is ...
Katzenbeisser, Stefan +4 more
core +1 more source
A new Definition and Classification of Physical Unclonable Functions
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is 1. meant to impede the duplication of
Merli, Dominik, Plaga, Rainer
core +1 more source
Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries
With advanced image journaling tools, one can easily alter the semantic meaning of an image by exploiting certain manipulation techniques such as copy-clone, object splicing, and removal, which mislead the viewers.
Bappy, Jawadul H. +4 more
core +1 more source

