A Data Hiding Method with Capabilities for Information Authentication and Face Image Recovery in E-commerce Applications
暂无分享,去创建一个
[1] Sun-Yuan Kung,et al. Face recognition/detection by probabilistic decision-based neural network , 1997, IEEE Trans. Neural Networks.
[2] Kirk L. Kroeker,et al. Graphics and Security: Exploring Visual Biometrics , 2002, IEEE Computer Graphics and Applications.
[3] Monson H. Hayes,et al. Face detection and recognition using hidden Markov models , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[4] Yeuan-Kuen Lee,et al. A NOVEL QUANTITY BASED ON CLIPPING STATISTICS FOR JSTEG STEGANALYSIS , 2006 .
[5] Patrick J. Flynn,et al. A survey of approaches to three-dimensional face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[6] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[7] Joseph G. Tront,et al. E-commerce security issues , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[8] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[9] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[10] Alex Pentland,et al. Face Recognition for Smart Environments , 2000, Computer.