Content-Based Biometric Image Hiding Approach
暂无分享,去创建一个
Jun Kong | Miao Qi | Yinghua Lu | Ning Du | Zhiqiang Ma
[1] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[2] Ioannis Pitas,et al. Chaotic Mixing of Digital Images and Applications to Watermarking , 1996 .
[3] Nalini K. Ratha,et al. Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.
[4] Yuan Yan Tang,et al. Facial Biometrics Using Nontensor Product Wavelet and 2D Discriminant Techniques , 2009, Int. J. Pattern Recognit. Artif. Intell..
[5] Lei Tian,et al. Chaotic secure content-based hidden transmission of biometric templates , 2007 .
[6] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[7] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[8] James M. McQueen,et al. Neural mechanisms for voice recognition , 2010, NeuroImage.
[9] Tieniu Tan,et al. Invariant texture segmentation via circular Gabor filters , 2002, Object recognition supported by user interaction for service robots.
[10] Xiao-Bing Hu,et al. Multi-objective optimization of material selection for sustainable products: Artificial neural networks and genetic algorithm approach , 2009 .
[11] Jie Zhou,et al. A comparative study of combining multiple enrolled samples for fingerprint verification , 2006, Pattern Recognit..
[12] Richa Singh,et al. Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..
[13] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[14] Chin-Chen Chang,et al. A lossless data embedding technique by joint neighboring coding , 2009, Pattern Recognit..
[15] Dong Ming,et al. Infrared gait recognition based on wavelet transform and support vector machine , 2010, Pattern Recognit..
[16] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[17] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[18] Yuan-Yu Tsai,et al. A novel data hiding scheme for color images using a BSP tree , 2007, J. Syst. Softw..
[19] Richa Singh,et al. Enhancing security of fingerprints through contextual biometric watermarking. , 2007, Forensic science international.
[20] Sushil J. Louis,et al. Genetic object recognition using combinations of views , 2002, IEEE Trans. Evol. Comput..
[21] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[22] Anil K. Jain,et al. Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.
[23] I. Jolliffe. Principal Component Analysis , 2002 .
[24] Patrick Shen-Pei Wang,et al. Extracting Faces and Facial Features from Color Images , 2008, Int. J. Pattern Recognit. Artif. Intell..
[25] Xiaoqing Ding,et al. Classifier Combination and its Application in Iris Recognition , 2008, Int. J. Pattern Recognit. Artif. Intell..
[26] Hugo Proença,et al. Iris Recognition: On the Segmentation of Degraded Images Acquired in the Visible Wavelength , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[27] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[28] Alexandre César Muniz de Oliveira,et al. A constructive genetic algorithm for gate matrix layout problems , 2002, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[29] Goldberg,et al. Genetic algorithms , 1993, Robust Control Systems with Genetic Algorithms.