1 |
"Digital Transformation of the Future of Work, 2019," KEPCO Journal on Electric Power and Energy, vol. 6, no. 1, pp. 1-5, Mar. 2020.
|
2 |
Alfred Zimmermann, Rainer Schmidt, Lakhmi C. Jain, Architecting the Digital Transformation - Digital Business, Technology, Decision Support, Management. Intelligent Systems Reference Library 188, ISBN 978-3-030-49639-5, Springer, 2021.
|
3 |
S. Milani, M. Fontani, P. Bestagini, M. Barni, A. Piva, M. Tagliasacchi, and S. Tubaro, "An overview on video forensics," APSIPA Transactions on Signal and Information Processing, vol. 1, 2012.
|
4 |
A. Gironi, M. Fontani, T. Bianchi, A. Piva, and M. Barni, "A video forensic technique for detecting frame deletion and insertion," in IEEE 2014 International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, pp. 6226-6230, 2014.
|
5 |
T.Y.Kim, J.I.Hong, M.G.Kang, S.H.Song, J.H.Lee and S.T.Kim, "Integrity Support System for Blockchain-based explainable CCTV Video," The Journal of The Institute of Internet, Broadcasting and Communication, vol. 21, no. 3, pp. 15-21, Jun. 2021.
DOI
|
6 |
Toda, M., Tsukada, M., Inoue, A. & Suzuki, T., High dynamic range rendering for YUV images with a constraint on perceptual chroma preservation, IEEE. ICIP., pp. 1817-1820, ISBN: 978-1- 4244-5654-3, 2009.
|
7 |
L.V. Cherckesova, O.A. Safaryan, N.G. Lyashenko, D.A. Korochentsev, Developing a New Collision-Resistant Hashing Algorithm. Mathematics 10, 2769, 2022. https://doi.org/10.3390/math10152769.
DOI
|
8 |
P. Rogaway, T. Shrimpton, "Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance", 2004.
|
9 |
R. C. Merkle, "A digital signature based on a conventional encryption function," in Advances in Cryptology - CRYPTO'87, C. Pomerance, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 369-378, 1988.
|