TID-MOP: the comprehensive framework of security management and control in the scenario of data exchange

Z Du, D Yue, Y Chengqi, H Boran… - Data Analysis and …, 2022 - manu44.magtech.com.cn
[Objective] In order to promote the safety and compliance development of data exchange,
this paper proposes a comprehensive framework of data transaction security management …

[PDF][PDF] Digital Data Growth and the Philosophy of Digital Universe in View of Emerging Technologies

SR Gundu, T Anuradha - Int. J. Sci. Res. in Computer Science and …, 2020 - academia.edu
Today cloud computing is a power full tool for the IT industry and private individuals. Cloud
service providers make available their services to their clients with help of web based …

[PDF][PDF] An interpolation based steganographic technique with least-significant-bit and pixel value differencing in a pixel block

J Majumder, C Pradhan - Indonesian Journal of Electrical …, 2022 - academia.edu
Over the past few years, in order to improve the hiding capacity and the peak signal-to-noise
ratio (PSNR) value, several steganographic techniques have been developed …

[PDF][PDF] Digital Rights Management of Images Using Quantinacci Sequence and LSB Embedding

HY Mohamed - 2023 - researchgate.net
The pressing need to protect digital media nowadays is now more prominent than ever due
to the continuous technological advancements that happen daily. One way of ensuring …

Trusted Transaction and Sharing for Industrial Internet Data Security

L Song, Y Li, Y Sun, CY Liu… - … Conference on Electronic …, 2021 - ieeexplore.ieee.org
Secured transaction and sharing for Industrial Internet data security fundamentally
guarantees the free and orderly flow of data and the value of the productive factor. In this …