A novel image hiding approach based on correlation analysis for secure multimodal biometrics
暂无分享,去创建一个
Jun Kong | Miao Qi | Yinghua Lu | Ning Du | Yinan Zhang | Chengxi Wang
[1] Hedieh Sajedi,et al. Cover Selection Steganography Method Based on Similarity of Image Blocks , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[2] Abd Allah Mohamed Mostafa. Embedded biometric data for a secure authentication watermarking , 2007 .
[3] Jiying Zhao,et al. Human visual system based adaptive digital image watermarking , 2008, Signal Process..
[4] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[5] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[6] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[7] Te-Hsiu Sun,et al. Applying particle swarm optimization algorithm to roundness measurement , 2009, Expert Syst. Appl..
[8] Jun Kong,et al. User-Specific Iris Authentication Based on Feature Selection , 2008, 2008 International Conference on Computer Science and Software Engineering.
[9] Stefan Winkler,et al. A vision-based masking model for spread-spectrum image watermarking , 2002, IEEE Trans. Image Process..
[10] Richa Singh,et al. Robust biometric image watermarking for fingerprint and face template protection , 2006, IEICE Electron. Express.
[11] M. Jamzad,et al. A robust steganography algorithm based on texture similarity using Gabor filter , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[12] Tieniu Tan,et al. Invariant texture segmentation via circular Gabor filters , 2002, Object recognition supported by user interaction for service robots.
[13] Richa Singh,et al. Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..
[14] Richa Singh,et al. Enhancing security of fingerprints through contextual biometric watermarking. , 2007, Forensic science international.
[15] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[16] Yuhong Li,et al. Parameter optimization of nonlinear grey Bernoulli model using particle swarm optimization , 2009, Appl. Math. Comput..
[17] Lei Tian,et al. Chaotic secure content-based hidden transmission of biometric templates , 2007 .
[18] Anil K. Jain,et al. Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.
[19] Yuan-Yu Tsai,et al. A novel data hiding scheme for color images using a BSP tree , 2007, J. Syst. Softw..
[20] Wen-Hsiang Tsai,et al. Data hiding in grayscale images by dynamic programming based on a human visual model , 2009, Pattern Recognit..
[21] Mohamed Mostafa Abd Allah,et al. Embedded biometric data for a secure authentication watermarking , 2007 .
[22] Chin-Chen Chang,et al. A lossless data embedding technique by joint neighboring coding , 2009, Pattern Recognit..
[23] Po-Wei Hsu,et al. A robust associative watermarking technique based on similarity diagrams , 2007, Pattern Recognit..
[24] Alejandro F. Frangi,et al. Two-dimensional PCA: a new approach to appearance-based face representation and recognition , 2004 .
[25] Ran-Zan Wang,et al. An image-hiding method with high hiding capacity based on best-block matching and k-means clustering , 2007, Pattern Recognit..
[26] Shantaram Vasikarla,et al. Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system model , 2005, Pattern Recognit. Lett..
[27] Nalini K. Ratha,et al. Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.
[28] Roberto Schirru,et al. Applying particle swarm optimization algorithm for tuning a neuro-fuzzy inference system for sensor monitoring , 2009 .
[29] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[30] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.