Open Access
ARTICLE
Jun Qi1,*, Chao Yang2, Xinliu Wang2, Junyou Yang1, Haixin Wang1, Huaqin Chen2,3, Zhenyan Li3
1 School of Electrical Engineering, Shenyang University of Technology, Shenyang, China
2 Information and Telecommunication Branch, State Grid Liaoning Electric Power Supply Co., Ltd., Shenyang, China
3 Guilin University of Electronic Technology, Guilin, China
* Corresponding Author: Jun Qi. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.076511
Received 21 November 2025; Accepted 13 February 2026; Published online 09 March 2026
View
Download
Like
Detection of Copy-Move Forgery in Digital Images Using Singular Value Decomposition
Zaid Nidhal Khudhair, Farhan Mohamed,...Advanced DAG-Based Ranking (ADR) Protocol for Blockchain Scalability
Tayyaba Noreen, Qiufen Xia, Muhammad...Lightweight Storage Framework for Blockchain-Enabled Internet of Things Under Cloud Computing
Xinyi Qing, Baopeng Ye, Yuanquan...Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm
Faguo Wu, Bo Zhou, Jie Jiang,...Quantum-Enhanced Blockchain: A Secure and Practical Blockchain Scheme
Ang Liu, Xiu-Bo Chen, Gang Xu,...