Showing 1 - 20 results of 4,916 for search '"Tampere"', query time: 1.12s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
    by Goldammer, Tina
    Published 2012
    Subjects: ...Stadtbibliothek Tampere...
    Get full text
    Get full text
    Get full text
    Article
  5. 5
    by Ball Jr, Maynard Marshall
    Published 2021
    ... of encoding information such that if the encoding is tampered with, the result encodes something either...
    Get full text
  6. 6
    by Yen-Shuo Shih, 施彥碩
    Published 2012
    ... watermarking scheme for image tamper detection and recovery is proposed to ensure ownership and integrity...
    Get full text
    Others
  7. 7
  8. 8
  9. 9
  10. 10
    by Chuang Lou Zou, 莊潤洲
    Published 2000
    ... methods, we propose a new image authentication that not only can prevent images tampered with but also...
    Get full text
    Others
  11. 11
    by Chen, Yi-Lei, 陳以雷
    Published 2009
    ..., tampering detection in JPEG images now plays an important role. Tampering on compressed images often involve...
    Get full text
    Others
  12. 12
    by Chih-Jung Hung, 洪志榮
    Published 2004
    ... content is tampered with. In this research, an image authentication scheme is first proposed, which...
    Get full text
    Others
  13. 13
    by YANG-HUNG YU, 楊閎宇
    Published 2011
    ... proposed a forensics system to detect the candidate tampered regions which are generated by using the human...
    Get full text
    Others
  14. 14
    by Dun-Yu Hsiao, 蕭敦育
    Published 2005
    ... of yours? If the answer is yes, then you have made some digital tampering. With powerful computer...
    Get full text
    Others
  15. 15
  16. 16
    by Hung-I Chang, 張弘毅
    Published 2015
    ... are transmitted through the network with the risk of being wiretapped and tampered. Therefore, ensuring...
    Get full text
    Others
  17. 17
    by Agarwal Ritu, Pant Mallika
    Published 2019-01-01
    ... in tampered images. Several features are extracted from normal and spliced images using spatial grey level...
    Get full text
    Article
  18. 18
    ... sector. Empirically this study is based on the emergent RM cluster in the region of Tampere in Finland...
    Get full text
    Article
  19. 19
    by Rådeskog, Tobias
    Published 2012
    ... a tamper warning in case the system is significantly moved from its place of mounting or subject...
    Get full text
    Others
  20. 20