Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions
Author(s): Ntalianis Klimis | Tsapatsoulis Nicolas | Drigas Athanasios
Volume: 2011
Issue: 1
Year: 2011




Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique
Author(s): Kuribayashi Minoru
Volume: 2011
Issue: 1
Year: 2011




A survey on biometric cryptosystems and cancelable biometrics
Author(s): Rathgeb Christian | Uhl Andreas
Volume: 2011
Issue: 1
Year: 2011




2DPCA fractal features and genetic algorithm for efficient face representation and recognition
Author(s): Ben Jemaa Yousra | Derbel Ahmed | Ben Jmaa Ahmed
Volume: 2011
Issue: 1
Year: 2011




Binary Biometric Representation through Pairwise Adaptive Phase Quantization
Author(s): Chen Chun | Veldhuis Raymond
Volume: 2011
Issue: 1
Year: 2011




Intrusion detection model based on selective packet sampling
Author(s): Bakhoum Ezzat
Volume: 2011
Issue: 1
Year: 2011




Research of Spatial Domain Image Digital Watermarking Payload
Author(s): Jia-Fa Mao | Ru Zhang | Xin-Xin Niu | Yi-Xian Yang | Lin-Na Zhou
Volume: 2011
Issue: 1
Year: 2011




Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions
Author(s): Klimis Ntalianis | Nicolas Tsapatsoulis | Athanasios Drigas
Volume: 2011
Year: 2011



Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique
Author(s): Minoru Kuribayashi
Volume: 2011
Year: 2011



Binary Biometric Representation through Pairwise Adaptive Phase Quantization
Author(s): Chun Chen | Raymond Veldhuis
Volume: 2011
Year: 2011



Research of Spatial Domain Image Digital Watermarking Payload
Author(s): Mao Jia-Fa | Zhang Ru | Niu Xin-Xin | Yang Yi-Xian | Zhou Lin-Na
Volume: 2011
Year: 2011



GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test
Author(s): Gafurov Davrondzhon | Bours Patrick | Yang Bian | Busch Christoph
Volume: 2010
Issue: 1
Year: 2010




Secure Arithmetic Coding with Error Detection Capability
Author(s): Sinaie Mahnaz | Vakili VahidTabataba
Volume: 2010
Issue: 1
Year: 2010




Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance
Author(s): Suthaharan Shan
Volume: 2010
Issue: 1
Year: 2010




On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol
Author(s): Kuribayashi Minoru
Volume: 2010
Issue: 1
Year: 2010




A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data
Author(s): Balakirsky VladimirB | Vinck AJHan
Volume: 2010
Issue: 1
Year: 2010




Reversible Watermarking Techniques: An Overview and a Classification
Author(s): Caldelli Roberto | Filippini Francesco | Becarelli Rudy
Volume: 2010
Issue: 1
Year: 2010




GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test
Author(s): Davrondzhon Gafurov | Patrick Bours | Bian Yang | Christoph Busch
Volume: 2010
Year: 2010



Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance
Author(s): Shan Suthaharan
Volume: 2010
Year: 2010



Reversible Watermarking Techniques: An Overview and a Classification
Author(s): Roberto Caldelli | Francesco Filippini | Rudy Becarelli
Volume: 2010
Year: 2010



On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol
Author(s): Minoru Kuribayashi
Volume: 2010
Year: 2010



A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data
Author(s): Vladimir B. Balakirsky | A. J. Han Vinck
Volume: 2010
Year: 2010



Secure Arithmetic Coding with Error Detection Capability
Author(s): Mahnaz Sinaie | Vahid Tabataba Vakili
Volume: 2010
Year: 2010



Improving the Security of CardSpace
Author(s): Alrodhan WaleedA | Mitchell ChrisJ
Volume: 2009
Issue: 1
Year: 2009




How Reed-Solomon Codes Can Improve Steganographic Schemes
Author(s): Fontaine Caroline | Galand Fabien
Volume: 2009
Issue: 1
Year: 2009




Enhancing Privacy Protection in Multimedia Systems
Author(s): Cheung Sen-chingSamson | Kundur Deepa | Senior Andrew
Volume: 2009
Issue: 1
Year: 2009




Peak-Shaped-Based Steganographic Technique for JPEG Images
Author(s): Rossi Lorenzo | Garzia Fabio | Cusani Roberto
Volume: 2009
Issue: 1
Year: 2009




Compression Independent Reversible Encryption for Privacy in Video Surveillance
Author(s): Carrillo Paula | Kalva Hari | Magliveras Spyros
Volume: 2009
Issue: 1
Year: 2009




Encrypted Domain DCT Based on Homomorphic Cryptosystems
Author(s): Bianchi Tiziano | Piva Alessandro | Barni Mauro
Volume: 2009
Issue: 1
Year: 2009




High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts
Author(s): Scagliola Michele | Pérez-González Fernando | Guccione Pietro
Volume: 2009
Issue: 1
Year: 2009




Steganography in 3D Geometries and Images by Adjacent Bin Mapping
Author(s): Wu Hao-Tian | Dugelay Jean-Luc
Volume: 2009
Issue: 1
Year: 2009




One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images
Author(s): Ito Izumi | Kiya Hitoshi
Volume: 2009
Issue: 1
Year: 2009




Reliable Steganalysis Using a Minimum Set of Samples and Features
Author(s): Miche Yoan | Bas Patrick | Lendasse Amaury | Jutten Christian | Simula Olli
Volume: 2009
Issue: 1
Year: 2009




Recoverable Privacy Protection for Video Content Distribution
Author(s): Li Guangzhen | Ito Yoshimichi | Yu Xiaoyi | Nitta Naoko | Babaguchi Noboru
Volume: 2009
Issue: 1
Year: 2009




Video Data Hiding for Managing Privacy Information in Surveillance Systems
Author(s): Paruchuri JithendraK | Cheung Sen-chingS | Hail MichaelW
Volume: 2009
Issue: 1
Year: 2009




Secure Steganography in Multimedia Content
Author(s): Goljan Miroslav | Westfeld Andreas
Volume: 2009
Issue: 1
Year: 2009




An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT
Author(s): Lv Xudong | Wang ZJane
Volume: 2009
Issue: 1
Year: 2009




Anonymous Biometric Access Control
Author(s): Ye Shuiming | Luo Ying | Zhao Jian | Cheung Sen-ChingS
Volume: 2009
Issue: 1
Year: 2009




A Novel Image Data Hiding Scheme with Diamond Encoding
Author(s): Chao Ruey-Ming | Wu Hsien-Chu | Lee Chih-Chiang | Chu Yen-Ping
Volume: 2009
Issue: 1
Year: 2009




Secure Steganography in Multimedia Content
Author(s): Miroslav Goljan | Andreas Westfeld
Volume: 2009
Year: 2009



Encrypted Domain DCT Based on Homomorphic Cryptosystems
Author(s): Tiziano Bianchi | Alessandro Piva | Mauro Barni
Volume: 2009
Year: 2009



Anonymous Biometric Access Control
Author(s): Shuiming Ye | Ying Luo | Jian Zhao | Sen-Ching S. Cheung
Volume: 2009
Year: 2009



How Reed-Solomon Codes Can Improve Steganographic Schemes
Author(s): Caroline Fontaine | Fabien Galand
Volume: 2009
Year: 2009



High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts
Author(s): Michele Scagliola | Fernando Pérez-González | Pietro Guccione
Volume: 2009
Year: 2009



An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT
Author(s): Xudong Lv | Z. Jane Wang
Volume: 2009
Year: 2009



Reliable Steganalysis Using a Minimum Set of Samples and Features
Author(s): Yoan Miche | Patrick Bas | Amaury Lendasse | Christian Jutten | Olli Simula
Volume: 2009
Year: 2009



Video Data Hiding for Managing Privacy Information in Surveillance Systems
Author(s): Jithendra K. Paruchuri | Sen-ching S. Cheung | Michael W. Hail
Volume: 2009
Year: 2009



Recoverable Privacy Protection for Video Content Distribution
Author(s): Guangzhen Li | Yoshimichi Ito | Xiaoyi Yu | Naoko Nitta | Noboru Babaguchi
Volume: 2009
Year: 2009



Enhancing Privacy Protection in Multimedia Systems
Author(s): Sen-ching Samson Cheung | Deepa Kundur | Andrew Senior
Volume: 2009
Year: 2009



Peak-Shaped-Based Steganographic Technique for JPEG Images
Author(s): Lorenzo Rossi | Fabio Garzia | Roberto Cusani
Volume: 2009
Year: 2009


