Author:
Ahmad Mohassin,Khursheed Farida
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference45 articles.
1. Abdelhakim A, Saleh HI, Abdelhakim M (2019) Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering. Multimed Tools Appl. 78(22):32523–32563
2. Ahmad M, Khursheed F (2021) Digital image detection approaches: a review applications of artificial intelligence in engineering. Springer, Singapore, pp 863–882
3. Al-Wesabi FN, Mahmood K, Nemri N (2020) A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model. J Inform Secur Appl 52:102473
4. Amerini I, Ballan L, Caldelli R, Bimbo AD, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE T Inf Foren Sec 6(3):1099–1110
5. Aramini B, Geraghty P, Lederer DJ, Costa J, Angelo SLD, Floros J, D’Ovidio F (2019) Surfactant protein A and D polymorphisms and methylprednisolone pharmacogenetics in donor lungs. J Thorac Cardiov Sur 157(5):2109–2117
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献