A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement
暂无分享,去创建一个
Laurent Nana | Anca Pascu | Quist-Aphetsi Kester | Nii Narku Quaynor | Sophie Gire | Jojo Moses Eghan
[1] Sung Bum Pan,et al. The Multi-Modal Human Identification Based on Smartcard in Video Surveillance System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[2] Bernd Freisleben,et al. Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants , 2007, OTM Conferences.
[3] Mengmeng Wang,et al. Digital image encryption algorithm based on pixels , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[4] Jill Slay,et al. Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[5] Feng Liu,et al. Improving the visual quality of size invariant visual cryptography scheme , 2012, J. Vis. Commun. Image Represent..
[6] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[7] A. Aisha Al-Abdallah,et al. Real-time traffic surveillance using ZigBee , 2010, 2010 International Conference On Computer Design and Applications.
[8] Wen Gao,et al. Vlogging: A survey of videoblogging technology on the web , 2010, CSUR.
[9] K. M. Koumadi,et al. Cryptographie technique for image encryption based on the RGB pixel displacement , 2012, 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST).
[10] Wen-Guey Tzeng,et al. A New Approach for Visual Cryptography , 2002, Des. Codes Cryptogr..
[11] Carlos E. Palau,et al. A video streaming application for urban traffic management , 2007, J. Netw. Comput. Appl..
[12] Marianne Winslett,et al. Preventing history forgery with secure provenance , 2009, TOS.
[13] Heung-Kyu Lee,et al. Color Extended Visual Cryptography Using Error Diffusion , 2011, IEEE Transactions on Image Processing.
[14] Punam Bedi,et al. Securing fingerprint images using a hybrid technique , 2012, ICACCI '12.
[15] Hyeon Park,et al. Large Data Transport for Real-Time Services in Sensor Networks , 2009, 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns.
[16] Masatsugu Ichino,et al. A study on the surveillance system using soft biometric information , 2013, 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE).
[17] A. Goel,et al. A Technique for Image Encryption Based on Explosive n*n Block Displacement Followed by Inter-pixel Displacement of RGB Attribute of a Pixel , 2012, 2012 International Conference on Communication Systems and Network Technologies.
[18] Norshuhani Zamin. Information Extraction for Counter-Terrorism: A Survey , 2009, 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns.
[19] Muhammad Khurram Khan,et al. Enhancing the Transmission Security of Content-Based Hidden Biometric Data , 2006, ISNN.
[20] S. C. Hui,et al. Remote Video Monitoring Over the WWW , 2003, Multimedia Tools and Applications.
[21] Ian T. Foster,et al. Grid information services for distributed resource sharing , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.
[22] Feng Liu,et al. Colour visual cryptography schemes , 2008, IET Inf. Secur..