Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An overview of steganography techniques applied to the protection of biometric data
Identification of persons by way of biometric features is an emerging phenomenon. Over the
years, biometric recognition has received much attention due to its need for security …
years, biometric recognition has received much attention due to its need for security …
A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system
Biometric security is a fast growing area that gains an increasing interest in the last decades.
Digital encryption and hiding techniques provide an efficient solution to protect biometric …
Digital encryption and hiding techniques provide an efficient solution to protect biometric …
[HTML][HTML] A novel encryption scheme for securing biometric templates based on 2D discrete wavelet transform and 3D Lorenz-chaotic system
This research paper proposes a novel encryption and decryption scheme for biometric
templates using two dimensional discrete wavelet transform (2D-DWT) and three …
templates using two dimensional discrete wavelet transform (2D-DWT) and three …
Robust image watermarking technique using support vector regression for blind geometric distortion correction in lifting wavelet transform and singular value …
This research work proposes a robust image watermarking technique for achieving
robustness against desynchronization attacks using a geometric distortion correction (GDC) …
robustness against desynchronization attacks using a geometric distortion correction (GDC) …
Biometric watermarking schemes based on QR decomposition and Schur decomposition in the RIDWT domain
This paper introduces two robust and optimized watermarking techniques designed to
protect the copyright of color digital images. These techniques involve embedding a …
protect the copyright of color digital images. These techniques involve embedding a …
[HTML][HTML] Artificial Neural Networks and Gene Expression Programing based age estimation using facial features
BZ Laskar, S Majumder - journal of king saud university-computer and …, 2015 - Elsevier
This work is about estimating human age automatically through analysis of facial images. It
has got a lot of real-world applications. Due to prompt advances in the fields of machine …
has got a lot of real-world applications. Due to prompt advances in the fields of machine …
[HTML][HTML] QSAR study for carcinogenic potency of aromatic amines based on GEP and MLPs
F Song, A Zhang, H Liang, L Cui, W Li, H Si… - International Journal of …, 2016 - mdpi.com
A new analysis strategy was used to classify the carcinogenicity of aromatic amines. The
physical-chemical parameters are closely related to the carcinogenicity of compounds …
physical-chemical parameters are closely related to the carcinogenicity of compounds …
A grid based iris biometric watermarking using wavelet transform
C Duraipandi, A Pratap… - … Conference on Recent …, 2014 - ieeexplore.ieee.org
Watermarking is the most smart and appropriate technique for copyright protection and
security of multimedia data. Watermarking has been recommended for the civilizing security …
security of multimedia data. Watermarking has been recommended for the civilizing security …
Machine learning methods used in evaluations of secure biometric system components
This paper provides a comprehensive overview of theories, methodologies, techniques,
standards and frameworks of biometric systems. The studies conducted between 2007-2017 …
standards and frameworks of biometric systems. The studies conducted between 2007-2017 …
Identification of under-detected periodicity in time-series microarray data by using empirical mode decomposition
CR Chen, WY Shu, CW Chang, IC Hsu - PloS one, 2014 - journals.plos.org
Detecting periodicity signals from time-series microarray data is commonly used to facilitate
the understanding of the critical roles and underlying mechanisms of regulatory …
the understanding of the critical roles and underlying mechanisms of regulatory …