Image Security and Biometrics: A Review
暂无分享,去创建一个
[1] Po-Whei Huang,et al. Dental biometrics: Human identification based on teeth and dental works in bitewing radiographs , 2012, Pattern Recognit..
[2] Patrick J. Flynn,et al. WITHDRAWN: Useful features for human verification in near-infrared periocular images☆☆☆★★★ , 2012 .
[3] Banafshe Arbab-Zavar,et al. On guided model-based analysis for ear biometrics , 2011, Comput. Vis. Image Underst..
[4] Namgyu Kim,et al. Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents , 2010, Signal Process. Image Commun..
[5] Hsien-Wen Tseng,et al. Prediction-based reversible data hiding , 2009, Inf. Sci..
[6] Jun Kong,et al. A novel image hiding approach based on correlation analysis for secure multimodal biometrics , 2010, J. Netw. Comput. Appl..
[7] Patrick J. Flynn,et al. Genetically identical irises have texture similarity that is not detected by iris biometrics , 2011, Comput. Vis. Image Underst..
[8] Ching-Nung Yang,et al. Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability , 2010, Image Vis. Comput..
[9] Ching-Nung Yang,et al. Colored visual cryptography scheme based on additive color mixing , 2008, Pattern Recognit..
[10] Alessandro Neri,et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..
[11] Hone-Ene Hwang. An optical image cryptosystem based on Hartley transform in the Fresnel transform domain , 2011 .
[12] Vasif V. Nabiyev,et al. Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..
[13] Hong Zhao,et al. Steganalysis for palette-based images using generalized difference image and color correlogram , 2011, Signal Process..
[14] David Zhang,et al. A feature extraction method for use with bimodal biometrics , 2010, Pattern Recognit..
[15] Xiaoyang Tan,et al. Pattern Recognition , 2016, Communications in Computer and Information Science.
[16] Bibhudendra Acharya,et al. Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem , 2010, Biometrics Technology.
[17] Chao-Hung Lin,et al. A High Capacity 3D Steganography Algorithm , 2009, IEEE Transactions on Visualization and Computer Graphics.
[18] Shang-Juh Kao,et al. A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..
[19] Edmundo Hoyle,et al. A fusion approach to unconstrained iris recognition , 2012, Pattern Recognit. Lett..
[20] Shaogang Gong,et al. Facial expression recognition based on Local Binary Patterns: A comprehensive study , 2009, Image Vis. Comput..
[21] Harry Wechsler,et al. Robust human authentication using appearance and holistic anthropometric features , 2010, Pattern Recognit. Lett..
[22] Hualou Liang,et al. A blind source separation-based method for multiple images encryption , 2008, Image Vis. Comput..
[23] Patrick J. Flynn,et al. Pupil dilation degrades iris biometric performance , 2009, Comput. Vis. Image Underst..
[24] Jiansheng Chen,et al. Palmprint authentication using a symbolic representation of images , 2010, Image Vis. Comput..
[25] Richa Singh,et al. Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..
[26] Rama Chellappa,et al. Face Recognition by Computers and Humans , 2010, Computer.
[27] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[28] Ajay Kumar,et al. Comparison and combination of iris matchers for reliable personal authentication , 2010, Pattern Recognit..
[29] Rémy Boyer,et al. How quantization based schemes can be used in image steganographic context , 2011, Signal Process. Image Commun..
[30] Tieniu Tan,et al. Toward Accurate and Fast Iris Segmentation for Iris Biometrics , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[31] Alain Trémeau,et al. Recent Trends in Color Image Watermarking , 2009 .
[32] Jianhua Wu,et al. Image encryption algorithm based on the multi-order discrete fractional Mellin transform , 2011 .
[33] F. A. Nennie,et al. Thorax biometrics from millimetre-wave images , 2010, Pattern Recognit. Lett..
[34] Vassil S. Dimitrov,et al. Fragile watermarking using finite field trigonometrical transforms , 2009, Signal Process. Image Commun..
[35] Chin-Chen Chang,et al. Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[36] Zhong Jin,et al. Two-Dimensional Local Graph Embedding Discriminant Analysis(F2DLGEDA) with Its Application to Face and Palm Biometrics , 2009, 2009 Chinese Conference on Pattern Recognition.
[37] Chin-Chen Chang,et al. Adaptive watermark mechanism for rightful ownership protection , 2008, J. Syst. Softw..
[38] Rémy Boyer,et al. Quantized based image watermarking in an independent domain , 2011, Signal Process. Image Commun..
[39] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[40] Gaurav Bhatnagar,et al. Fractional dual tree complex wavelet transform and its application to biometric security during communication and transmission , 2012, Future Gener. Comput. Syst..
[41] Bart Jacobs,et al. Biometrics and their use in e-passports , 2009, Image Vis. Comput..
[42] Yu-Chih Huang,et al. Reversible Data Hiding Based on Histogram , 2009, ICIC.
[43] Aladdin M. Ariyaeeinia,et al. Qualitative fusion of normalised scores in multimodal biometrics , 2009, Pattern Recognit. Lett..
[44] Ingemar J. Cox,et al. Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[45] Gian Luca Marcialis,et al. Group-specific face verification using soft biometrics , 2009, J. Vis. Lang. Comput..
[46] Madasu Hanmandlu,et al. Score level fusion of multimodal biometrics using triangular norms , 2011, Pattern Recognit. Lett..
[47] Mircea Nicolescu,et al. Hand-based verification and identification using palm-finger segmentation and fusion , 2009, Comput. Vis. Image Underst..
[48] Wei Jia,et al. Locality preserving discriminant projections for face and palmprint recognition , 2010, Neurocomputing.
[49] Abd Allah Mohamed Mostafa. Embedded biometric data for a secure authentication watermarking , 2007 .
[50] A. Ben Hamza,et al. Secret sharing approaches for 3D object encryption , 2011, Expert Syst. Appl..
[51] Sangyoun Lee,et al. Biometric Image Authentication using Watermarking , 2006, 2006 SICE-ICASE International Joint Conference.
[52] Babak Mahdian,et al. A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..
[53] William Puech,et al. Lossless 3D steganography based on MST and connectivity modification , 2010, Signal Process. Image Commun..
[54] Ming-Shi Wang,et al. A fuzzy c-means clustering-based fragile watermarking scheme for image authentication , 2009, Expert Syst. Appl..
[55] Jun Jin,et al. A secret image sharing based on neighborhood configurations of 2-D cellular automata , 2012 .
[56] Nicolae Duta,et al. A survey of biometric technology based on hand shape , 2009, Pattern Recognit..
[57] Won-gyum Kim,et al. Multimodal biometric image watermarking using two-stage integrity verification , 2009, Signal Process..
[58] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[59] Fabio Roli,et al. Personal identity verification by serial fusion of fingerprint and face matchers , 2009, Pattern Recognit..
[60] Long-Wen Chang,et al. Secure reversible visible image watermarking with authentication , 2010, Signal Process. Image Commun..
[61] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[62] Jicheng Wang,et al. A novel watermarking scheme for H.264/AVC video authentication , 2011, Signal Process. Image Commun..
[63] Ioannis A. Kakadiaris,et al. Profile-based 3D-aided face recognition , 2012, Pattern Recognit..
[64] Patrick J. Flynn,et al. Image understanding for iris biometrics: A survey , 2008, Comput. Vis. Image Underst..
[65] Xuelong Li,et al. A local Tchebichef moments-based robust image watermarking , 2009, Signal Process..
[66] Allen Y. Yang,et al. Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[67] Xinpeng Zhang,et al. Fragile watermarking scheme using a hierarchical mechanism , 2009, Signal Process..
[68] Jeng-Shyang Pan,et al. The optimized copyright protection system with genetic watermarking , 2008, Soft Comput..
[69] David Zhang,et al. Combine crossing matching scores with conventional matching scores for bimodal biometrics and face and palmprint recognition experiments , 2011, Neurocomputing.
[70] Hae-Yeoun Lee,et al. Reversible data hiding exploiting spatial correlation between sub-sampled images , 2009, Pattern Recognit..
[71] Manuel Graña,et al. Face recognition with lattice independent component analysis and extreme learning machines , 2012, Soft Comput..
[72] Ashraf Darwish,et al. The use of computational intelligence in digital watermarking: review, challenges, and new trends , 2011 .
[73] Patrick J. Flynn,et al. Useful features for human verification in near-infrared periocular images , 2011, Image Vis. Comput..
[74] Mingguang Shan,et al. Fractional Fourier-domain random encoding and pixel scrambling technique for double image encryption , 2012 .
[75] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[76] Chin-Chen Chang,et al. Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector , 2010, Digit. Signal Process..
[77] Atilla Baskurt,et al. A Comprehensive Survey on Three-Dimensional Mesh Watermarking , 2008, IEEE Transactions on Multimedia.
[78] Bruce J. Tromberg,et al. Face Recognition in Hyperspectral Images , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[79] David Zhang,et al. A survey of palmprint recognition , 2009, Pattern Recognit..
[80] Yuan Yan Tang,et al. Multiscale facial structure representation for face recognition under varying illumination , 2009, Pattern Recognit..
[81] Patrick J. Flynn,et al. Degradation of iris recognition performance due to non-cosmetic prescription contact lenses , 2010, Comput. Vis. Image Underst..
[82] Atilla Baskurt,et al. A Comprehensive Survey on Three-Dimensional , 2008 .
[83] Chin-Chen Chang,et al. A secure fragile watermarking scheme based on chaos-and-hamming code , 2011, J. Syst. Softw..
[84] Ramachandra Raghavendra,et al. Designing efficient fusion schemes for multimodal biometric systems using face and palmprint , 2011, Pattern Recognit..