-
1
-
-
58849112169
-
Overview of image security techniques with applications in multimedia systems
-
November
-
R. B. Wolfgang and E. J. Delp, "Overview of image security techniques with applications in multimedia systems," Proceedings of the SPIE Conference on Multimedia Networks: Security, Displays, Terminals, and Gatweys 3228, pp. 297-308, November 1997.
-
(1997)
Proceedings of the SPIE Conference on Multimedia Networks: Security, Displays, Terminals, and Gatweys
, vol.3228
, pp. 297-308
-
-
Wolfgang, R.B.1
Delp, E.J.2
-
2
-
-
84957892352
-
Robust digital watermarking based on key-dependent basis function
-
Information hiding: second international workshop
-
J. Fridrich, A. Baldoza, and R.J.Simard, "Robust digital watermarking based on key-dependent basis function," Information hiding: second international workshop, Lecture notes in computer science 1525.
-
Lecture notes in computer science
, vol.1525
-
-
Fridrich, J.1
Baldoza, A.2
Simard, R.J.3
-
4
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
June
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: issues and challenges," Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management 92, pp. 948-960, June 2004.
-
(2004)
Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management
, vol.92
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
5
-
-
36048934579
-
Advanced encryption standard, federal information processing standard publication 197, nationale institute of standard and technology
-
"Advanced encryption standard, federal information processing standard publication 197, nationale institute of standard and technology," 2001.
-
(2001)
-
-
-
7
-
-
36049050921
-
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar, Biometric encryption using image processing, in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, Rudolf L. Van Renesse, 3314.
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar, "Biometric encryption using image processing," in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, Rudolf L. Van Renesse, 3314.
-
-
-
-
8
-
-
30844458593
-
A fuzzy vault scheme
-
A. Juels and M. Sudan, "A fuzzy vault scheme," Des. Codes Cryptography 38(2), pp. 237-257, 2006.
-
(2006)
Des. Codes Cryptography
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
9
-
-
26444525625
-
Fuzzy vault for fingerprints
-
U. Uludag, S. Pankanti, and A. K. Jain, "Fuzzy vault for fingerprints," in AVBPA, pp. 310-319, 2005.
-
(2005)
AVBPA
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
10
-
-
84937704662
-
Secure smartcard based fingerprint authentication
-
ACM Press, New York, NY, USA
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcard based fingerprint authentication," in WBMA '03: Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications, pp. 45-52, ACM Press, (New York, NY, USA), 2003.
-
(2003)
WBMA '03: Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
11
-
-
27244453175
-
Symmetric hash functions for fingerprint minutiae
-
S. Tulyakov, F. Farooq, and V. Govindaraju, "Symmetric hash functions for fingerprint minutiae," in ICAPR, pp. 30-38, 2005.
-
(2005)
ICAPR
, pp. 30-38
-
-
Tulyakov, S.1
Farooq, F.2
Govindaraju, V.3
-
12
-
-
36049017629
-
Data hiding for multimodal biometric recognition
-
A. Giannoula and D. Hatzinakos, "Data hiding for multimodal biometric recognition," in ISCAS(Z), pp. 165-168, 2004.
-
(2004)
ISCAS(Z)
, pp. 165-168
-
-
Giannoula, A.1
Hatzinakos, D.2
-
14
-
-
33845303553
-
Hiding iris data for authentication of digital images using wavelet theory
-
A. Hassanien, "Hiding iris data for authentication of digital images using wavelet theory," Pattern Recognition and Image Analysis 16(4), pp. 637-643, 2006.
-
(2006)
Pattern Recognition and Image Analysis
, vol.16
, Issue.4
, pp. 637-643
-
-
Hassanien, A.1
-
17
-
-
34548206703
-
Perceptual data hiding in tree structured haar transform domain
-
January
-
M. Cancellaro, M. Carli, K. Egiazarian, and J. Astola, "Perceptual data hiding in tree structured haar transform domain," proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, California, USA, January 2007.
-
(2007)
proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, California, USA
-
-
Cancellaro, M.1
Carli, M.2
Egiazarian, K.3
Astola, J.4
-
18
-
-
0037737759
-
Scalar costa scheme for information embedding
-
April
-
J. J. Eggers, R. Buml, R. Tzschoppe, and B. Girod, "Scalar costa scheme for information embedding," IEEE Transaction on signal processing 51, April 2003.
-
(2003)
IEEE Transaction on signal processing
, vol.51
-
-
Eggers, J.J.1
Buml, R.2
Tzschoppe, R.3
Girod, B.4
|