Robust information security system using steganography, orthogonal code and joint transform correlation
暂无分享,去创建一个
[1] Andrew D. Ker. Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.
[2] Fan Chung Graham,et al. Optical orthogonal codes: Design, analysis, and applications , 1989, IEEE Trans. Inf. Theory.
[3] Juline E. Mills,et al. Cybercrimes against Consumers: Could Biometric Technology Be the Solution? , 2006, IEEE Internet Computing.
[4] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[5] James T. Curran,et al. Fortuna: Cryptographically Secure Pseudo-Random Number Generation In Software And Hardware , 2006 .
[6] Deepthi Bala,et al. Biometrics and information security , 2008, InfoSecCD2008 2008.
[7] Jiying Zhao,et al. A fuzzy vault implementation for securing revocable iris templates , 2011, 2011 IEEE International Systems Conference.
[8] Vinod Chandran,et al. Biometric template security using Higher Order Spectra , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[9] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[10] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[11] Kevin Curran,et al. Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).
[12] M. N. Islam. Color image encryption using multiple reference joint transform correlation , 2012, 2012 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[13] Muhammad Faysal Islam,et al. Efficient and Robust Information Security System Employing Color Encoded Steganography and Orthogonal Encryption , 2012 .
[14] M. Grgic,et al. A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.
[15] M. N. Islam,et al. A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography , 2012, Defense + Commercial Sensing.
[16] Pong C. Yuen,et al. Binary Discriminant Analysis for Generating Binary Face Template , 2012, IEEE Transactions on Information Forensics and Security.
[17] Caroline Viola,et al. A NOVEL APPROACH TO FINGERPRINT IDENTIFICATION USING GABOR FILTER-BANK , 2015 .
[18] Xiangyang Luo,et al. A secure LSB steganography system defeating sample pair analysis based on chaos system and dynamic compensation , 2006, 2006 8th International Conference Advanced Communication Technology.
[19] Ana González-Marcos,et al. Biometric Identification through Hand Geometry Measurements , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[20] M. Nazrul Islam. Encryption and multiplexing of fingerprints for enhanced security , 2011, 2011 IEEE Long Island Systems, Applications and Technology Conference.