Iterative self-correction for secured images using turbo codes and soft input decryption
暂无分享,去创建一个
[1] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[2] Jaejin Lee,et al. A watermarking sequence using parities of error control coding for image authentication and correction , 2000, IEEE Trans. Consumer Electron..
[3] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[4] Seungmin Rho,et al. Robust facial landmark extraction scheme using multiple convolutional neural networks , 2018, Multimedia Tools and Applications.
[5] J. Absher. Hypersexuality and Neuroimaging Personality, Social Cognition, and Character , 2016 .
[6] Natasa Zivic. Robust Image Authentication in the Presence of Noise , 2015 .
[7] Charles G. Boncelet. The NTMAC for authentication of noisy messages , 2006, IEEE Transactions on Information Forensics and Security.
[8] Nata ˇsa Živi´c,et al. Robust image authentication in the presence of noise , 2015 .
[9] Christoph Ruland,et al. Secure and Robust Two-Phase Image Authentication , 2015, IEEE Transactions on Multimedia.
[10] John Cocke,et al. Optimal decoding of linear codes for minimizing symbol error rate (Corresp.) , 1974, IEEE Trans. Inf. Theory.
[11] Natasa Zivic. Soft correction and verification of the messages protected by cryptographic check values , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[12] Rabia Jafri,et al. A Survey of Face Recognition Techniques , 2009, J. Inf. Process. Syst..
[13] Dengpan Mou,et al. Machine-based Intelligent Face Recognition , 2010 .
[14] Oscar Castillo,et al. Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing - An Evolutionary Approach for Neural Networks and Fuzzy Systems , 2005, Studies in Fuzziness and Soft Computing.
[15] David Chase,et al. Class of algorithms for decoding block codes with channel measurement information , 1972, IEEE Trans. Inf. Theory.
[16] Anil K. Jain,et al. Handbook of Face Recognition, 2nd Edition , 2011 .
[17] Shu Lin,et al. Error Control Coding , 2004 .
[18] Thirimachos Bourlai,et al. Face Recognition Across the Imaging Spectrum , 2016, Springer International Publishing.
[19] Natasa Zivic,et al. Two-Phase Method for Image Authentication and Enhanced Decoding , 2017, IEEE Access.
[20] I. Reed,et al. Polynomial Codes Over Certain Finite Fields , 1960 .
[21] Fernando Muñoz,et al. Data Acquisition System based on Subsampling Using Multiple Clocking Techniques , 2012, IEEE Transactions on Instrumentation and Measurement.