To search, Click below search items.
All Published Papers Search Service
Title
Distributed Data Access Control Algorithm Using Mining Association Rules
Author
N.Rajkumar, S.N.Sivanandam, J. Stanly Thomas
Vol. 8 No. 8 pp. 306-311
Keywords
Data mining, Association rules, DDACA, FAK
Safe Secret Image Sharing with Fault Tolerance Key
Wen-Pinn Fang
Vol. 11 No. 9 pp. 20-23
Secret image sharing, fault-tolerance, fake contour, Rijndael
Data Leakage Detection Using Encrypted Fake Objects
Anusha.Koneru, G. Siva Nageswara Rao, J.Venkata Rao
Vol. 14 No. 3 pp. 115-120
Allocation strategies, data leakage, encryption, decryption, fake objects, guilty agent, optimization
Inter frame Tampering Detection based on DWT-DCT Markov Features and Fine tuned AlexNet Model
Malle Raveendra and K Nagireddy
Vol. 20 No. 12 pp. 1-12
Inter frame video fakes, Video manipulation, Artisan features, Markov-based approach, Convolutional Neural Network (CNN).