Academic Journals Database
Disseminating quality controlled scientific knowledge

EURASIP Journal on Information Security

ISSN: 1687--4161
Publisher: Hindawi Publishing Corporation


ADD TO MY LIST
 
Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions

Author(s): Ntalianis Klimis | Tsapatsoulis Nicolas | Drigas Athanasios
Volume: 2011
Issue: 1
Year: 2011
Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique

Author(s): Kuribayashi Minoru
Volume: 2011
Issue: 1
Year: 2011
A survey on biometric cryptosystems and cancelable biometrics

Author(s): Rathgeb Christian | Uhl Andreas
Volume: 2011
Issue: 1
Year: 2011
2DPCA fractal features and genetic algorithm for efficient face representation and recognition

Author(s): Ben Jemaa Yousra | Derbel Ahmed | Ben Jmaa Ahmed
Volume: 2011
Issue: 1
Year: 2011
Binary Biometric Representation through Pairwise Adaptive Phase Quantization

Author(s): Chen Chun | Veldhuis Raymond
Volume: 2011
Issue: 1
Year: 2011
Intrusion detection model based on selective packet sampling

Author(s): Bakhoum Ezzat
Volume: 2011
Issue: 1
Year: 2011
Research of Spatial Domain Image Digital Watermarking Payload

Author(s): Jia-Fa Mao | Ru Zhang | Xin-Xin Niu | Yi-Xian Yang | Lin-Na Zhou
Volume: 2011
Issue: 1
Year: 2011
Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions

Author(s): Klimis Ntalianis | Nicolas Tsapatsoulis | Athanasios Drigas
Volume: 2011
Year: 2011
Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique

Author(s): Minoru Kuribayashi
Volume: 2011
Year: 2011
Binary Biometric Representation through Pairwise Adaptive Phase Quantization

Author(s): Chun Chen | Raymond Veldhuis
Volume: 2011
Year: 2011
Research of Spatial Domain Image Digital Watermarking Payload

Author(s): Mao Jia-Fa | Zhang Ru | Niu Xin-Xin | Yang Yi-Xian | Zhou Lin-Na
Volume: 2011
Year: 2011
GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test

Author(s): Gafurov Davrondzhon | Bours Patrick | Yang Bian | Busch Christoph
Volume: 2010
Issue: 1
Year: 2010
Secure Arithmetic Coding with Error Detection Capability

Author(s): Sinaie Mahnaz | Vakili VahidTabataba
Volume: 2010
Issue: 1
Year: 2010
Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance

Author(s): Suthaharan Shan
Volume: 2010
Issue: 1
Year: 2010
On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol

Author(s): Kuribayashi Minoru
Volume: 2010
Issue: 1
Year: 2010
A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data

Author(s): Balakirsky VladimirB | Vinck AJHan
Volume: 2010
Issue: 1
Year: 2010
Reversible Watermarking Techniques: An Overview and a Classification

Author(s): Caldelli Roberto | Filippini Francesco | Becarelli Rudy
Volume: 2010
Issue: 1
Year: 2010
GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test

Author(s): Davrondzhon Gafurov | Patrick Bours | Bian Yang | Christoph Busch
Volume: 2010
Year: 2010
Reversible Watermarking Techniques: An Overview and a Classification

Author(s): Roberto Caldelli | Francesco Filippini | Rudy Becarelli
Volume: 2010
Year: 2010
A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data

Author(s): Vladimir B. Balakirsky | A. J. Han Vinck
Volume: 2010
Year: 2010
Secure Arithmetic Coding with Error Detection Capability

Author(s): Mahnaz Sinaie | Vahid Tabataba Vakili
Volume: 2010
Year: 2010
Improving the Security of CardSpace

Author(s): Alrodhan WaleedA | Mitchell ChrisJ
Volume: 2009
Issue: 1
Year: 2009
How Reed-Solomon Codes Can Improve Steganographic Schemes

Author(s): Fontaine Caroline | Galand Fabien
Volume: 2009
Issue: 1
Year: 2009
Enhancing Privacy Protection in Multimedia Systems

Author(s): Cheung Sen-chingSamson | Kundur Deepa | Senior Andrew
Volume: 2009
Issue: 1
Year: 2009
Peak-Shaped-Based Steganographic Technique for JPEG Images

Author(s): Rossi Lorenzo | Garzia Fabio | Cusani Roberto
Volume: 2009
Issue: 1
Year: 2009
Compression Independent Reversible Encryption for Privacy in Video Surveillance

Author(s): Carrillo Paula | Kalva Hari | Magliveras Spyros
Volume: 2009
Issue: 1
Year: 2009
Encrypted Domain DCT Based on Homomorphic Cryptosystems

Author(s): Bianchi Tiziano | Piva Alessandro | Barni Mauro
Volume: 2009
Issue: 1
Year: 2009
High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts

Author(s): Scagliola Michele | Pérez-González Fernando | Guccione Pietro
Volume: 2009
Issue: 1
Year: 2009
Steganography in 3D Geometries and Images by Adjacent Bin Mapping

Author(s): Wu Hao-Tian | Dugelay Jean-Luc
Volume: 2009
Issue: 1
Year: 2009
One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images

Author(s): Ito Izumi | Kiya Hitoshi
Volume: 2009
Issue: 1
Year: 2009
Reliable Steganalysis Using a Minimum Set of Samples and Features

Author(s): Miche Yoan | Bas Patrick | Lendasse Amaury | Jutten Christian | Simula Olli
Volume: 2009
Issue: 1
Year: 2009
Recoverable Privacy Protection for Video Content Distribution

Author(s): Li Guangzhen | Ito Yoshimichi | Yu Xiaoyi | Nitta Naoko | Babaguchi Noboru
Volume: 2009
Issue: 1
Year: 2009
Video Data Hiding for Managing Privacy Information in Surveillance Systems

Author(s): Paruchuri JithendraK | Cheung Sen-chingS | Hail MichaelW
Volume: 2009
Issue: 1
Year: 2009
Secure Steganography in Multimedia Content

Author(s): Goljan Miroslav | Westfeld Andreas
Volume: 2009
Issue: 1
Year: 2009
An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT

Author(s): Lv Xudong | Wang ZJane
Volume: 2009
Issue: 1
Year: 2009
Anonymous Biometric Access Control

Author(s): Ye Shuiming | Luo Ying | Zhao Jian | Cheung Sen-ChingS
Volume: 2009
Issue: 1
Year: 2009
A Novel Image Data Hiding Scheme with Diamond Encoding

Author(s): Chao Ruey-Ming | Wu Hsien-Chu | Lee Chih-Chiang | Chu Yen-Ping
Volume: 2009
Issue: 1
Year: 2009
Secure Steganography in Multimedia Content

Author(s): Miroslav Goljan | Andreas Westfeld
Volume: 2009
Year: 2009
Encrypted Domain DCT Based on Homomorphic Cryptosystems

Author(s): Tiziano Bianchi | Alessandro Piva | Mauro Barni
Volume: 2009
Year: 2009
Anonymous Biometric Access Control

Author(s): Shuiming Ye | Ying Luo | Jian Zhao | Sen-Ching S. Cheung
Volume: 2009
Year: 2009
How Reed-Solomon Codes Can Improve Steganographic Schemes

Author(s): Caroline Fontaine | Fabien Galand
Volume: 2009
Year: 2009
High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts

Author(s): Michele Scagliola | Fernando Pérez-González | Pietro Guccione
Volume: 2009
Year: 2009
An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT

Author(s): Xudong Lv | Z. Jane Wang
Volume: 2009
Year: 2009
Reliable Steganalysis Using a Minimum Set of Samples and Features

Author(s): Yoan Miche | Patrick Bas | Amaury Lendasse | Christian Jutten | Olli Simula
Volume: 2009
Year: 2009
Video Data Hiding for Managing Privacy Information in Surveillance Systems

Author(s): Jithendra K. Paruchuri | Sen-ching S. Cheung | Michael W. Hail
Volume: 2009
Year: 2009
Recoverable Privacy Protection for Video Content Distribution

Author(s): Guangzhen Li | Yoshimichi Ito | Xiaoyi Yu | Naoko Nitta | Noboru Babaguchi
Volume: 2009
Year: 2009
Enhancing Privacy Protection in Multimedia Systems

Author(s): Sen-ching Samson Cheung | Deepa Kundur | Andrew Senior
Volume: 2009
Year: 2009
Peak-Shaped-Based Steganographic Technique for JPEG Images

Author(s): Lorenzo Rossi | Fabio Garzia | Roberto Cusani
Volume: 2009
Year: 2009
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Rapperswil
Tango Rapperswil