Secure transmission of medical information using IRIS recognition and steganography
暂无分享,去创建一个
[1] Ashok A. Ghatol,et al. Iris recognition: an emerging biometric technology , 2007 .
[2] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[3] Luminita Vasiu,et al. Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.
[4] Libor Masek,et al. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .
[5] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[6] Wen-Pinn Fang,et al. Non-expansion Visual Secret Sharing in Reversible Style , 2009 .
[7] Arun Ross,et al. Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.
[8] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[9] Arun Ross,et al. Visual cryptography for face privacy , 2010, Defense + Commercial Sensing.
[10] Hong Zhao,et al. Visual Cryptographic Scheme with High Image Quality , 2008, CIS.
[11] Lahouari Ghouti,et al. Protecting Fingerprint Data Using Watermarking , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).
[12] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[13] Tzung-Her Chen,et al. Multiple-Image Encryption by Rotating Random Grids , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[14] M. Sujatha,et al. Recognition of Human Iris Patterns for Biometric Identification , 2015 .
[15] Chander Kant,et al. Biometrics Security using Steganography , 2008 .
[16] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[17] Arun Ross,et al. Protecting Iris Images through Asymmetric Digital Watermarking , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.
[18] Morampudi Naresh kumar,et al. A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis , 2011 .