Iterative self-correction for secured images using turbo codes and soft input decryption

[1]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[2]  Jaejin Lee,et al.  A watermarking sequence using parities of error control coding for image authentication and correction , 2000, IEEE Trans. Consumer Electron..

[3]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[4]  Seungmin Rho,et al.  Robust facial landmark extraction scheme using multiple convolutional neural networks , 2018, Multimedia Tools and Applications.

[5]  J. Absher Hypersexuality and Neuroimaging Personality, Social Cognition, and Character , 2016 .

[6]  Natasa Zivic Robust Image Authentication in the Presence of Noise , 2015 .

[7]  Charles G. Boncelet The NTMAC for authentication of noisy messages , 2006, IEEE Transactions on Information Forensics and Security.

[8]  Nata ˇsa Živi´c,et al.  Robust image authentication in the presence of noise , 2015 .

[9]  Christoph Ruland,et al.  Secure and Robust Two-Phase Image Authentication , 2015, IEEE Transactions on Multimedia.

[10]  John Cocke,et al.  Optimal decoding of linear codes for minimizing symbol error rate (Corresp.) , 1974, IEEE Trans. Inf. Theory.

[11]  Natasa Zivic Soft correction and verification of the messages protected by cryptographic check values , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[12]  Rabia Jafri,et al.  A Survey of Face Recognition Techniques , 2009, J. Inf. Process. Syst..

[13]  Dengpan Mou,et al.  Machine-based Intelligent Face Recognition , 2010 .

[14]  Oscar Castillo,et al.  Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing - An Evolutionary Approach for Neural Networks and Fuzzy Systems , 2005, Studies in Fuzziness and Soft Computing.

[15]  David Chase,et al.  Class of algorithms for decoding block codes with channel measurement information , 1972, IEEE Trans. Inf. Theory.

[16]  Anil K. Jain,et al.  Handbook of Face Recognition, 2nd Edition , 2011 .

[17]  Shu Lin,et al.  Error Control Coding , 2004 .

[18]  Thirimachos Bourlai,et al.  Face Recognition Across the Imaging Spectrum , 2016, Springer International Publishing.

[19]  Natasa Zivic,et al.  Two-Phase Method for Image Authentication and Enhanced Decoding , 2017, IEEE Access.

[20]  I. Reed,et al.  Polynomial Codes Over Certain Finite Fields , 1960 .

[21]  Fernando Muñoz,et al.  Data Acquisition System based on Subsampling Using Multiple Clocking Techniques , 2012, IEEE Transactions on Instrumentation and Measurement.