[Retracted] Healthcare and Fitness Data Management Using the IoT‐Based Blockchain Platform
T Frikha, A Chaari, F Chaabane… - Journal of …, 2021 - Wiley Online Library
Because of the availability of more than an actor and a wireless component among e‐health
applications, providing more security and safety is expected. Moreover, ensuring data …
applications, providing more security and safety is expected. Moreover, ensuring data …
Embedded Keccak implementation on FPGA
The use of Blockchain has evolved over the last decade. It has touched many fields such as
health, industry 4.0, smart cities, agriculture, education etc. Being a guarantee of security …
health, industry 4.0, smart cities, agriculture, education etc. Being a guarantee of security …
Audio watermarking for security and non-security applications
The digitization of audiovisual data is significantly increasing. Thus, to guarantee the
protection of the intellectual properties of this digital content, watermarking has appeared as …
protection of the intellectual properties of this digital content, watermarking has appeared as …
A Novel Robust Spread Spectrum Watermarking Scheme for 3D Video Traitor Tracing
The 3D video traitor tracing approach is an effective technique for securing 3D content. This
approach involves the protection of the multimedia content and the prevention of each …
approach involves the protection of the multimedia content and the prevention of each …
Robust and secure watermarking technique for E-health applications
Advancement in information and communication technology in health sector has been
developed at a rapid pace, and has consequently improved its different services. Securing …
developed at a rapid pace, and has consequently improved its different services. Securing …
Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video
Securing multimedia content and preventing it from being maliciously manipulated has
developed at a rapid pace, and researchers have been studying the traitor tracing as an …
developed at a rapid pace, and researchers have been studying the traitor tracing as an …
Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing
M Jiang, H Yang - Journal of Information Processing Systems, 2023 - koreascience.kr
To effectively track the illegal use of digital images and maintain the security of digital image
communication on the Internet, this paper proposes a reversible multipurpose image …
communication on the Internet, this paper proposes a reversible multipurpose image …
Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video
CB Amar - Computer Analysis of Images and Patterns: 19th …, 2021 - books.google.com
Securing multimedia content and preventing it from being maliciously manipulated has
developed at a rapid pace, and researchers have been studying the traitor tracing as an …
developed at a rapid pace, and researchers have been studying the traitor tracing as an …
[PDF][PDF] Research Article Healthcare and Fitness Data Management Using the IoT-Based Blockchain Platform
T Frikha, A Chaari, F Chaabane, O Cheikhrouhou… - 2021 - academia.edu
Because of the availability of more than an actor and a wireless component among e-health
applications, providing more security and safety is expected. Moreover, ensuring data …
applications, providing more security and safety is expected. Moreover, ensuring data …